26 results on '"Ban, Tao"'
Search Results
2. Port-Piece Embedding for Darknet Traffic Features and Clustering of Scan Attacks
3. CDMC’19—The 10th International Cybersecurity Data Mining Competition
4. Combating Threat-Alert Fatigue with Online Anomaly Detection Using Isolation Forest
5. Employ Decision Values for Soft-Classifier Evaluation with Crispy References
6. Detection of Botnet Activities Through the Lens of a Large-Scale Darknet
7. The Usability of Metadata for Android Application Analysis
8. Fine-Grained Risk Level Quantication Schemes Based on APK Metadata
9. Adaptive DDoS-Event Detection from Big Darknet Traffic Data
10. MonkeyDroid: Detecting Unreasonable Privacy Leakages of Android Applications
11. Detecting Malicious Spam Mails: An Online Machine Learning Approach
12. Referential kNN Regression for Financial Time Series Forecasting
13. Training Minimum Enclosing Balls for Cross Tasks Knowledge Transfer
14. Behavior Analysis of Long-term Cyber Attacks in the Darknet
15. SDE-Driven Service Provision Control
16. A Fine-Grained Classification Approach for the Packed Malicious Code
17. TrafficS: A Behavior-Based Network Traffic Classification Benchmark System with Traffic Sampling Functionality
18. Network Flow Classification Based on the Rhythm of Packets
19. Entropy Based Discriminators for P2P Teletraffic Characterization
20. AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces
21. String Kernel Based SVM for Internet Security Implementation
22. G-Means: A Clustering Algorithm for Intrusion Detection
23. Hierarchical Core Vector Machines for Network Intrusion Detection
24. Spanning SVM Tree for Personalized Transductive Learning
25. Anomaly Intrusion Detection for Evolving Data Stream Based on Semi-supervised Learning
26. Using Genetic Algorithm to Balance the D-Index Algorithm for Metric Search
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.