Network Science and Cybersecurity最新文献

筛选
英文 中文
Design of Neuromorphic Architectures with Memristors 具有记忆电阻器的神经形态结构设计
Network Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-7597-2_6
D. Kudithipudi, Cory E. Merkel, Michael Soltiz, G. Rose, R. Pino
{"title":"Design of Neuromorphic Architectures with Memristors","authors":"D. Kudithipudi, Cory E. Merkel, Michael Soltiz, G. Rose, R. Pino","doi":"10.1007/978-1-4614-7597-2_6","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_6","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"95 ( Pt 4) 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123923742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Machine Learning Applied to Cyber Operations 机器学习在网络作战中的应用
Network Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-7597-2_10
Misty K. Blowers, Jonathan Williams
{"title":"Machine Learning Applied to Cyber Operations","authors":"Misty K. Blowers, Jonathan Williams","doi":"10.1007/978-1-4614-7597-2_10","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_10","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125845448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Recognizing Unexplained Behavior in Network Traffic 识别网络流量中无法解释的行为
Network Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-7597-2_3
Massimiliano Albanese, R. Erbacher, S. Jajodia, Cristian Molinaro, Fabio Persia, A. Picariello, Giancarlo Sperlí, V. S. Subrahmanian
{"title":"Recognizing Unexplained Behavior in Network Traffic","authors":"Massimiliano Albanese, R. Erbacher, S. Jajodia, Cristian Molinaro, Fabio Persia, A. Picariello, Giancarlo Sperlí, V. S. Subrahmanian","doi":"10.1007/978-1-4614-7597-2_3","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_3","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131517644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Alert Data Aggregation and Transmission Prioritization over Mobile Networks 移动网络上的警报数据聚合和传输优先级
Network Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-7597-2_13
H. Çam, Pierre Mouallem, Robinson E. Pino
{"title":"Alert Data Aggregation and Transmission Prioritization over Mobile Networks","authors":"H. Çam, Pierre Mouallem, Robinson E. Pino","doi":"10.1007/978-1-4614-7597-2_13","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_13","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"IM-34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126636255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bridging the Semantic Gap: Human Factors in Anomaly-Based Intrusion Detection Systems 弥合语义鸿沟:基于异常的入侵检测系统中的人为因素
Network Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-7597-2_2
Richard E. Harang
{"title":"Bridging the Semantic Gap: Human Factors in Anomaly-Based Intrusion Detection Systems","authors":"Richard E. Harang","doi":"10.1007/978-1-4614-7597-2_2","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_2","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123328920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards Fundamental Science of Cyber Security 网络安全基础科学
Network Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-7597-2_1
A. Kott
{"title":"Towards Fundamental Science of Cyber Security","authors":"A. Kott","doi":"10.1007/978-1-4614-7597-2_1","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_1","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128922752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Hardware Accelerated Mining of Domain Knowledge 硬件加速领域知识挖掘
Network Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-7597-2_16
Tanvir Atahary, Scott Douglass, T. Taha
{"title":"Hardware Accelerated Mining of Domain Knowledge","authors":"Tanvir Atahary, Scott Douglass, T. Taha","doi":"10.1007/978-1-4614-7597-2_16","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_16","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117127174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Memristors and the Future of Cyber Security Hardware 忆阻器和网络安全硬件的未来
Network Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-7597-2_17
Michael J. Shevenell, J. Shumaker, A. Edwards, R. Pino
{"title":"Memristors and the Future of Cyber Security Hardware","authors":"Michael J. Shevenell, J. Shumaker, A. Edwards, R. Pino","doi":"10.1007/978-1-4614-7597-2_17","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_17","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123737510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Kernel Control-Flow Modifying Rootkits 检测内核控制流修改Rootkits
Network Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-7597-2_11
Xueyang Wang, R. Karri
{"title":"Detecting Kernel Control-Flow Modifying Rootkits","authors":"Xueyang Wang, R. Karri","doi":"10.1007/978-1-4614-7597-2_11","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_11","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115712913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Concurrent Learning Algorithm and the Importance Map 并行学习算法和重要性图
Network Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-7597-2_15
M. R. McLean
{"title":"Concurrent Learning Algorithm and the Importance Map","authors":"M. R. McLean","doi":"10.1007/978-1-4614-7597-2_15","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_15","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131031059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信