Discover more insights into Malicious Attacks 악의적인 공격

Keywords frequently search together with Malicious Attacks 악의적인 공격

Narrow sentence examples with built-in keyword filters

Malicious Attacks sentence examples within intrusion detection system



An efficient network intrusion detection approach based on deep learning


Intrusion Detection System Configuration Under Asymmetric Information

Malicious Attacks sentence examples within cloud computing environment



A reliable authentication scheme of personal health records in cloud computing


A Double-Blind Anonymous Evaluation-Based Trust Model in Cloud Computing Environments

Malicious Attacks sentence examples within fusion e g



Information Fusion as an Autonomy enabler for UAV Traffic Management



Malicious Attacks sentence examples within Variou Malicious Attacks



Integration of Blockchain and AI in EHR sharing: A survey


A novel reversible fragile watermarking in DWT domain for tamper localization and digital image authentication

Malicious Attacks sentence examples within Prevent Malicious Attacks



The Cross-Domain Identity Authentication Scheme Has no Trusted Authentication Center in the Cloud Environment


Anomaly Detection using Machine Learning Techniques in Wireless Sensor Networks

Malicious Attacks sentence examples within Detect Malicious Attacks



Deep belief network based intrusion detection techniques: A survey


Detecting Malicious URL using Neural Network

Malicious Attacks sentence examples within Resist Malicious Attacks



Task Offloading for Wireless VR-Enabled Medical Treatment With Blockchain Security Using Collective Reinforcement Learning


An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing

Malicious Attacks sentence examples within Identify Malicious Attacks



Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks


Anomaly detection and optimization using scalable and flexible network data characterization

Malicious Attacks sentence examples within Toward Malicious Attacks



Query-based targeted action-space adversarial policies on deep reinforcement learning agents


A reliable and secure image watermarking algorithm using homomorphic transform in DWT domain

Malicious Attacks sentence examples within Avoid Malicious Attacks



Smart Contracts Refinement for Gas Optimization


A Legacy Infrastructure-based Mechanism for Moving Target Defense

Malicious Attacks sentence examples within Launch Malicious Attacks



Prosecutor: an efficient BFT consensus algorithm with behavior-aware penalization against Byzantine attacks


Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection

Malicious Attacks sentence examples within Several Malicious Attacks



A maximum entropy classification scheme for phishing detection using parsimonious features


Security Analysis of Capsule Network Inference using Horizontal Collaboration

Malicious Attacks sentence examples within Common Malicious Attacks



On Designing Context-Aware Trust Model and Service Delegation for Social Internet of Things


Mitigating SYN Flooding and UDP Flooding in P4-based SDN

Malicious Attacks sentence examples within Preventing Malicious Attacks



An artificial intelligence-based real-time monitoring framework for time series


A dictionary-based method for detecting machine-generated domains

Malicious Attacks sentence examples within malicious attacks occur



Improved RBF Network Intrusion Detection Model Based on Edge Computing with Multi-algorithm Fusion


Research on network security risk analysis method based on full traffic

Malicious Attacks sentence examples within malicious attacks remain



Multifactor authentication technique for a secure electronic voting system


A Low Distortion Audio Self-Recovery Algorithm Robust to Discordant Size Content Replacement Attack

Malicious Attacks sentence examples within malicious attacks targeting



A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems


Intelligent anomaly identification in cyber-physical inverter-based systems

Malicious Attacks sentence examples within malicious attacks caused



Systemically Evaluating the Robustness of ML-based IoT Malware Detectors


Multipath resilient routing for endogenous secure software defined networks


LogBERT: Log Anomaly Detection via BERT



Secure Verifiable Scheme for Biometric System based on Secret Sharing and CSK



Application of Lidar INS Integrated Positioning in Automatic Driving



A Mobile Malware Detection Method Based on Malicious Subgraphs Mining



Performance of EWMA and ANN-based Schemes in Detection of Denial of Service Attack



A Multipronged Approach to Effectively Secure SMPTE ST 2059 Time Transfer



Recent advances in adversarial machine learning: status, challenges and perspectives



A Memetic Algorithm for Optimizing Inter-links to Enhance the Robustness of Interdependent Networks Against Malicious Attacks



FBMC/OQAM Security Strategy Based on Diversity DNA Encryption



Deep Reinforcement Learning-based Resilient Control Method for CBTC Systems through Train-to-Train Communications under Adversarial Attacks



Predicting Malware Attacks using Machine Learning and AutoAI



LSTM and CNN based ensemble approach for spoof detection task in automatic speaker verification systems



InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices



DQN-Based Optimization Framework for Secure Sharded Blockchain Systems



Snort’s Role in IoT Deployment



A blockchain-based access control scheme for smart home



Threat Modeling and IoT Attack Surfaces



Precise Timing Based on Pulsar Observation for Grid Synchronization


More Malicious Attacks 악의적인 공격 sentence examples
10.1109/PerComWorkshops51409.2021.9431064

Detecting malicious COVID-19 URLs using machine learning techniques



Machine learning based false data injection in smart grid



SAFE ROUTING MODEL AND BALANCED LOAD MODEL FOR WIRELESS SENSOR NETWORK



ARTINALI++: Multi-dimensional Specification Mining for Complex Cyber-Physical System Security



Generalized attack separation scheme in cyber physical smart grid based on robust interval state estimation



Asynchronous Hierarchical Forecasting-Aided State Estimator With Sub-Area Data Validation for Power Systems



Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems



STRONG: Synchronous and asynchronous robust network localization, under non-Gaussian noise



Sliding-mode secure control for jump cyber- physical systems with malicious attacks



Robust, Secure, and Adaptive Trust-Oriented Service Selection in IoT-Based Smart Buildings



On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective



Relaibility in Underwater Wireless Sensor Networks



Adversarial Attack and Defense Strategies for Deep Speaker Recognition Systems



Diagnosis and Mitigation of Smart Cyber-Attacks on an Offshore Wind Farm Network Operator



A Dynamic Reconfiguration-based Approach to Resilient State Estimation



On the Security and Privacy Challenges of Virtual Assistants



An All-Digital Wideband OFDM-based Frequency-hopping System using RF Sampling Data Converters



Advance Mailing System for the Detection of Malicious Network Activities



Resilient operation of multi-energy industrial park based on integrated hydrogen-electricity-heat microgrids



Transaction-Based Hidden Strategies against General Phishing Detection Framework on Ethereum



Bilinear Dynamical Networks Under Malicious Attack: An Efficient Edge Protection Method



Information-theoretic approach for secure localization against sybil attack in wireless sensor network


Learn more from Malicious Attacks 악의적인 공격

Malicious Attacks 악의적인 공격


Malicious Attacks 악의적인 공격
Encyclopedia 백과사전