Angles最新文献

筛选
英文 中文
IFMD: image fusion for malware detection IFMD:恶意软件检测的图像融合
Angles Pub Date : 2022-08-16 DOI: 10.1007/s11416-022-00445-y
H. Hashemi, M. Samie, A. Hamzeh
{"title":"IFMD: image fusion for malware detection","authors":"H. Hashemi, M. Samie, A. Hamzeh","doi":"10.1007/s11416-022-00445-y","DOIUrl":"https://doi.org/10.1007/s11416-022-00445-y","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"271 - 286"},"PeriodicalIF":0.0,"publicationDate":"2022-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45767122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RETRACTED ARTICLE: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM 检索文章:使用基于MBGWO的混合LSTM联合检测和分类基于签名和NetFlow的互联网蠕虫
Angles Pub Date : 2022-08-10 DOI: 10.1007/s11416-022-00442-1
Mundlamuri Venkata Rao, Divya Midhunchakkaravarthy, Sujatha Dandu
{"title":"RETRACTED ARTICLE: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM","authors":"Mundlamuri Venkata Rao, Divya Midhunchakkaravarthy, Sujatha Dandu","doi":"10.1007/s11416-022-00442-1","DOIUrl":"https://doi.org/10.1007/s11416-022-00442-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"241 - 255"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49649013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTED ARTICLE: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation 检索文章:用于网络威胁安全防御自动化的人工智能模糊多模式决策支持系统
Angles Pub Date : 2022-08-06 DOI: 10.1007/s11416-022-00443-0
Feilu Hang, Linjiang Xie, Zhenhong Zhang, W. Guo, Hanruo Li
{"title":"RETRACTED ARTICLE: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation","authors":"Feilu Hang, Linjiang Xie, Zhenhong Zhang, W. Guo, Hanruo Li","doi":"10.1007/s11416-022-00443-0","DOIUrl":"https://doi.org/10.1007/s11416-022-00443-0","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"257 - 269"},"PeriodicalIF":0.0,"publicationDate":"2022-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44951976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XAI for intrusion detection system: comparing explanations based on global and local scope 入侵检测系统的XAI:基于全局和局部范围的解释比较
Angles Pub Date : 2022-07-31 DOI: 10.1007/s11416-022-00441-2
S. Hariharan, R. R. Rejimol Robinson, Rendhir R. Prasad, Ciza Thomas, N. Balakrishnan
{"title":"XAI for intrusion detection system: comparing explanations based on global and local scope","authors":"S. Hariharan, R. R. Rejimol Robinson, Rendhir R. Prasad, Ciza Thomas, N. Balakrishnan","doi":"10.1007/s11416-022-00441-2","DOIUrl":"https://doi.org/10.1007/s11416-022-00441-2","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"217 - 239"},"PeriodicalIF":0.0,"publicationDate":"2022-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49063618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Intelligence in security countermeasures selection 安全对策选择中的情报
Angles Pub Date : 2022-07-22 DOI: 10.1007/s11416-022-00439-w
Sina Tamjidi, Alireza Shameli-Sendi
{"title":"Intelligence in security countermeasures selection","authors":"Sina Tamjidi, Alireza Shameli-Sendi","doi":"10.1007/s11416-022-00439-w","DOIUrl":"https://doi.org/10.1007/s11416-022-00439-w","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"137 - 148"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46742063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NADA: new architecture for detecting DoS and DDoS attacks in fog computing NADA:雾计算中检测DoS和DDoS攻击的新架构
Angles Pub Date : 2022-07-14 DOI: 10.1007/s11416-022-00431-4
S. Azizpour, M. Majma
{"title":"NADA: new architecture for detecting DoS and DDoS attacks in fog computing","authors":"S. Azizpour, M. Majma","doi":"10.1007/s11416-022-00431-4","DOIUrl":"https://doi.org/10.1007/s11416-022-00431-4","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"51 - 64"},"PeriodicalIF":0.0,"publicationDate":"2022-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43843328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security intrusion detection using quantum machine learning techniques 基于量子机器学习技术的安全入侵检测
Angles Pub Date : 2022-06-24 DOI: 10.1007/s11416-022-00435-0
M. Kalinin, V. Krundyshev
{"title":"Security intrusion detection using quantum machine learning techniques","authors":"M. Kalinin, V. Krundyshev","doi":"10.1007/s11416-022-00435-0","DOIUrl":"https://doi.org/10.1007/s11416-022-00435-0","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"125 - 136"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44066262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Application of the SAMA methodology to Ryuk malware SAMA方法在Ryuk恶意软件中的应用
Angles Pub Date : 2022-06-22 DOI: 10.1007/s11416-022-00434-1
Ander Granado Masid, Javier Bermejo Higuera, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo
{"title":"Application of the SAMA methodology to Ryuk malware","authors":"Ander Granado Masid, Javier Bermejo Higuera, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo","doi":"10.1007/s11416-022-00434-1","DOIUrl":"https://doi.org/10.1007/s11416-022-00434-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"165 - 198"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44159912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Behavior-based detection and classification of malicious software utilizing structural characteristics of group sequence graphs 利用群序列图的结构特征对恶意软件进行基于行为的检测和分类
Angles Pub Date : 2022-06-15 DOI: 10.1007/s11416-022-00423-4
Stavros D. Nikolopoulos, Iosif Polenakis
{"title":"Behavior-based detection and classification of malicious software utilizing structural characteristics of group sequence graphs","authors":"Stavros D. Nikolopoulos, Iosif Polenakis","doi":"10.1007/s11416-022-00423-4","DOIUrl":"https://doi.org/10.1007/s11416-022-00423-4","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"383 - 406"},"PeriodicalIF":0.0,"publicationDate":"2022-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49571459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and classification of malicious software utilizing Max-Flows between system-call groups 利用系统调用组之间的Max-Flows检测和分类恶意软件
Angles Pub Date : 2022-06-14 DOI: 10.1007/s11416-022-00433-2
Alvaro Chysi, Stavros D. Nikolopoulos, Iosif Polenakis
{"title":"Detection and classification of malicious software utilizing Max-Flows between system-call groups","authors":"Alvaro Chysi, Stavros D. Nikolopoulos, Iosif Polenakis","doi":"10.1007/s11416-022-00433-2","DOIUrl":"https://doi.org/10.1007/s11416-022-00433-2","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"97 - 123"},"PeriodicalIF":0.0,"publicationDate":"2022-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42571388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信