NETWORK_SECURITY

作品数:249被引量:639H指数:8
导出分析报告
相关作者:薛静锋曹元大龚俭刘建航陈英杰更多>>
相关机构:清华大学东南大学南京航空航天大学北京理工大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家高技术研究发展计划国家重点基础研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Behaviour-diverse automatic penetration testing:a coverage-based deep reinforcement learning approach
《Frontiers of Computer Science》2025年第3期15-24,共10页Yizhou YANG Longde CHEN Sha LIU Lanning WANG Haohuan FU Xin LIU Zuoning CHEN 
supported by te Key Research Project of Zhejiang Lab(No.2021PB0AV02)。
Reinforcement Learning(RL)is gaining importance in automating penetration testing as it reduces human effort and increases reliability.Nonetheless,given the rapidly expanding scale of modern network infrastructure,the...
关键词:network security penetration testing reinforcement learning artificial intelligence 
Application Strategies of Artificial Intelligence and Big Data Technology in Computer Monitoring and Control
《Journal of Electronic Research and Application》2025年第2期29-34,共6页Yumin Yuan Xiyuan Li 
This article focuses on the current computer monitoring and control as the research direction,studying the application strategies of artificial intelligence and big data technology in this field.It includes an introdu...
关键词:Computer monitoring and control Artificial intelligence technology Big data technology Hardware and software Network security 
Software Defined Networks: Strengths, Weaknesses, and Resilience to Failures
《Engineering(科研)》2025年第1期19-29,共11页Wendnéso Aïda Ouedraogo Rakissaga Hamidou Harouna Omar Pegdwindé Justin Kouraogo 
This article examines the architecture of software-defined networks (SDN) and its implications for the modern management of communications infrastructures. By decoupling the control plane from the data plane, SDN offe...
关键词:Software Defined Networking (SDN) SDN Architecture Fault Tolerance Network Security PROGRAMMABILITY Interoperability Communication Infrastructures 
Does a higher hashrate strengthen Bitcoin network security?
《Financial Innovation》2024年第1期1032-1046,共15页Daehan Kim Doojin Ryu Robert I.Webb 
supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea(NRF-2022S1A5A2A01044485).
In the blockchain world,proof-of-work is the dominant protocol mechanism that determines the consensus of the ledger.The hashrate,a measure of the computational power directed toward securing a blockchain through proo...
关键词:Bitcoin Blockchain security Blockchain sustainability Financial innovation Proof-of-work 
Machine learning based fileless malware traffic classification using image visualization
《Cybersecurity》2024年第4期1-18,共18页Fikirte Ayalke Demmese Ajaya Neupane Sajad Khorsandroo May Wang Kaushik Roy Yu Fu 
supported in part by NSF Grants#2113945 and#2200538 and a generous financial and technical support from Palo Alto Networks,Inc.
In today's interconnected world,network traffic is replete with adversarial attacks.As technology evolves,these attacks are also becoming increasingly sophisticated,making them even harder to detect.Fortunately,artifi...
关键词:Network security Traffic classification Fileless malware Image visualization Machine learning INTRUSION 
Robust Network Security:A Deep Learning Approach to Intrusion Detection in IoT
《Computers, Materials & Continua》2024年第12期4149-4169,共21页Ammar Odeh Anas Abu Taleb 
The proliferation of Internet of Things(IoT)technology has exponentially increased the number of devices interconnected over networks,thereby escalating the potential vectors for cybersecurity threats.In response,this...
关键词:Intrusion detection system(IDS) Internet of Things(IoT) convolutional neural network(CNN) long short-term memory(LSTM) autoencoder network security deep learning data preprocessing feature selection cyber threats 
A Review of Generative Adversarial Networks for Intrusion Detection Systems: Advances, Challenges, and Future Directions
《Computers, Materials & Continua》2024年第11期2053-2076,共24页Monirah Al-Ajlan Mourad Ykhlef 
The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Gener...
关键词:Intrusion detection systems network security generative networks deep learning DATASET 
Optimizing Network Security via Ensemble Learning: A Nexus with Intrusion Detection
《Journal of Information Security》2024年第4期545-556,共12页Anu Baluguri Vasudha Pasumarthy Indranil Roy Bidyut Gupta Nick Rahimi 
Network intrusion detection systems need to be updated due to the rise in cyber threats. In order to improve detection accuracy, this research presents a strong strategy that makes use of a stacked ensemble method, wh...
关键词:Machine Learning Cyber-Security Data Preprocessing Model Training 
Adaptive Update Distribution Estimation under Probability Byzantine Attack
《Computers, Materials & Continua》2024年第10期1667-1685,共19页Gang Long Zhaoxin Zhang 
The secure and normal operation of distributed networks is crucial for accurate parameter estimation.However,distributed networks are frequently susceptible to Byzantine attacks.Considering real-life scenarios,this pa...
关键词:Distribution estimation network security least-mean-square binomial distribution probability Byzantine attack 
Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System
《Computers, Materials & Continua》2024年第9期3655-3683,共29页Abdullah Alabdulatif Navod Neranjan Thilakarathne Mohamed Aashiq 
funded by Qassim University(QU-APC-2024-9/1).
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber threats.Among the myriad of potential...
关键词:Machine learning Internet of Things(IoT) DoS DDoS CYBERSECURITY intrusion prevention network security feature optimization sustainability 
检索报告 对象比较 聚类工具 使用帮助 返回顶部