From post

Malicious Packet Classification Based on Neural Network Using Kitsune Features.

, , , , , , и . ISPR, том 1589 из Communications in Computer and Information Science, стр. 306-314. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A scalable and accurate feature representation method for identifying malicious mobile applications., , , , , и . SAC, стр. 1182-1189. ACM, (2019)An Accurate Packer Identification Method Using Support Vector Machine., , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (1): 253-263 (2014)Application of string kernel based support vector machine for malware packer identification., , , , и . IJCNN, стр. 1-8. IEEE, (2013)An autonomous online malicious spam email detection system using extended RBF network., , , , и . IJCNN, стр. 1-7. IEEE, (2015)Discovery of Relationships between Interests from Bulletin Board System by Dissimilarity Reconstruction., , и . Discovery Science, том 2843 из Lecture Notes in Computer Science, стр. 328-335. Springer, (2003)A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis., , и . ICONIP (2), том 6444 из Lecture Notes in Computer Science, стр. 267-274. Springer, (2010)Using Genetic Algorithm to Balance the D-Index Algorithm for Metric Search.. ICONIP (2), том 4985 из Lecture Notes in Computer Science, стр. 264-273. Springer, (2007)Fine-Grained Risk Level Quantication Schemes Based on APK Metadata., , , и . ICONIP (3), том 9491 из Lecture Notes in Computer Science, стр. 663-673. Springer, (2015)Generating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems., , , , , и . IEEE Access, (2022)Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks., , , , , , , , и . IEEE Access, (2021)