PERSISTENT

作品数:530被引量:1275H指数:15
导出分析报告
相关作者:王林ChineseSocietyofClinicalOncologyCSCOdiagnosisandtreatmentguidelinesforpersistentrecurrentandmetastaticdifferentiatedthyroidcancerworkinggroup蒋高明于顺利毛建兵更多>>
相关机构:重庆医科大学昆明理工大学国防科学技术大学特拉维夫大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金广东省自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 学科=自动化与计算机技术x
条 记 录,以下是1-10
视图:
排序:
Enhanced Detection of APT Vector Lateral Movement in Organizational Networks Using Lightweight Machine Learning
《Computers, Materials & Continua》2025年第4期281-308,共28页Mathew Nicho Oluwasegun Adelaiye Christopher D.McDermott Shini Girija 
Rabdan Academy for funding the research presented in the paper.
The successful penetration of government,corporate,and organizational IT systems by state and non-state actors deploying APT vectors continues at an alarming pace.Advanced Persistent Threat(APT)attacks continue to pos...
关键词:Intrusion detection lateral movement machine learning advanced persistent threats 
A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques
《Computers, Materials & Continua》2024年第8期2675-2719,共45页Singamaneni Krishnapriya Sukhvinder Singh 
The increase in number of people using the Internet leads to increased cyberattack opportunities.Advanced Persistent Threats,or APTs,are among the most dangerous targeted cyberattacks.APT attacks utilize various advan...
关键词:Advanced persistent threats APT cyber security intrusion detection cyber attacks 
Insider threat detection approach for tobacco industry based on heterogeneous graph embedding
《High Technology Letters》2024年第2期199-210,共12页季琦 LI Wei PAN Bailin XUE Hongkai QIU Xiang 
Supported by the National Natural Science Foundation of China(No.62203390);the Science and Technology Project of China TobaccoZhejiang Industrial Co.,Ltd(No.ZJZY2022E004)。
In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,t...
关键词:insider threat detection advanced persistent threats graph construction heterogeneous graph embedding 
Detecting APT-Exploited Processes through Semantic Fusion and Interaction Prediction
《Computers, Materials & Continua》2024年第2期1731-1754,共24页Bin Luo Liangguo Chen Shuhua Ruan Yonggang Luo 
This work was supported by the National Natural Science Foundation of China(Nos.U19A2081,62202320);the Fundamental Research Funds for the Central Universities(Nos.2022SCU12116,2023SCU12129,2023SCU12126);the Science and Engineering Connotation Development Project of Sichuan University(No.2020SCUNG129);the Key Laboratory of Data Protection and Intelligent Management(Sichuan University),Ministry of Education.
Considering the stealthiness and persistence of Advanced Persistent Threats(APTs),system audit logs are leveraged in recent studies to construct system entity interaction provenance graphs to unveil threats in a host....
关键词:Advanced persistent threat provenance graph multi-head self-attention graph neural network 
Dalea:A Persistent Multi-Level Extendible Hashing with Improved Tail Performance
《Journal of Computer Science & Technology》2023年第5期1051-1073,共23页熊子威 蒋德钧 熊劲 Ren Ren 
supported by the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No.XDB44030200;the Beijing Natural Science Foundation-Haidian Joint Fund for Original Innovation under Grant No.L192038.
Persistent memory(PM)promises byte-addressability,large capacity,and durability.Main memory systems,such as key-value stores and in-memory databases,benefit from such features of PM.Due to the great popularity of hash...
关键词:persistent memory persistent hashing indexing structure 
Advanced Persistent Threat Detection and Mitigation Using Machine Learning Model
《Intelligent Automation & Soft Computing》2023年第6期3691-3707,共17页U.Sakthivelu C.N.S.Vinoth Kumar 
The detection of cyber threats has recently been a crucial research domain as the internet and data drive people’s livelihood.Several cyber-attacks lead to the compromise of data security.The proposed system offers c...
关键词:Advanced persistent threats lateral movement detection dynamic deception remote desktop protocol Internet Protocol attack detection 
NICFS:a file system based on persistent memory and SmartNIC
《Frontiers of Information Technology & Electronic Engineering》2023年第5期675-687,共13页Yitian YANG Youyou LU 
Project supported by the National Key R&D Program of China(No.2021YFB0300500);the National Natural Science Foundation of China(No.62022051)。
Emergence of new hardware,including persistent memory and smart network interface card(SmartNIC),has brought new opportunities to file system design.In this paper,we design and implement a new file system named NICFS ...
关键词:Non-volatile memory Persistent memory Data processing unit Smart network interface card(SmartNIC) File system 
An efficient wear-leveling-aware multi-grained allocator for persistent memory file systems
《Frontiers of Information Technology & Electronic Engineering》2023年第5期688-702,共15页Zhiwang YU Runyu ZHANG Chaoshu YANG Shun NIE Duo LIU 
Project supported by the National Natural Science Foundation of China(No.62162011);the Doctor Funds of Guizhou University,China(Nos.2020(13)and 2022(44))。
Persistent memory(PM)file systems have been developed to achieve high performance by exploiting the advanced features of PMs,including nonvolatility,byte addressability,and dynamic random access memory(DRAM)like perfo...
关键词:File system Persistent memory Wear-leveling Multi-grained allocator 
An Effective Threat Detection Framework for Advanced Persistent Cyberattacks被引量:1
《Computers, Materials & Continua》2023年第5期4231-4253,共23页So-Eun Jeon Sun-Jin Lee Eun-Young Lee Yeon-Ji Lee Jung-Hwa Ryu Jung-Hyun Moon Sun-Min Yi Il-Gu Lee 
This study is the result of a commissioned research project supported by the affiliated institute of ETRI(No.2021-026);partially supported by the NationalResearch Foundation of Korea(NRF)grant funded by the Korean government(MSIT)(No.2020R1F1A1061107);the Korea Institute for Advancement of Technology(KIAT)grant funded by the Korean government(MOTIE)(P0008703,The Competency Development Program for Industry Specialist);the MSIT under the ICAN(ICT Challenge and Advanced Network of HRD)program[grant number IITP-2022-RS-2022-00156310];supervised by the Institute of Information&Communication Technology Planning and Evaluation(IITP).
Recently,with the normalization of non-face-to-face online environments in response to the COVID-19 pandemic,the possibility of cyberattacks through endpoints has increased.Numerous endpoint devices are managed meticu...
关键词:Advanced persistent threat CYBERSECURITY endpoint security MITRE ATT&CK open-source threat detector threat log collector 
RCache: A Read-Intensive Workload-Aware Page Cache for NVM Filesystem被引量:1
《ZTE Communications》2023年第1期89-94,共6页TU Yaofeng ZHU Bohong YANG Hongzhang HAN Yinjun SHU Jiwu 
supported by ZTE Industry⁃University⁃Institute Coopera⁃tion Funds under Grant No.HC⁃CN⁃20181128026.
Byte-addressable non-volatile memory(NVM),as a new participant in the storage hierarchy,gives extremely high performance in storage,which forces changes to be made on current filesystem designs.Page cache,once a signi...
关键词:storage system file system persistent memory 
检索报告 对象比较 聚类工具 使用帮助 返回顶部