Search
Search Results
-
Dom-BERT: Detecting Malicious Domains with Pre-training Model
Domain Name System (DNS) is widely abused by attackers, which thus makes malicious domain detection a crucial routine task for operators to combat... -
Semi-supervised Malicious Domain Detection Based on Meta Pseudo Labeling
The Domain Name System (DNS) is a crucial infrastructure of the Internet, yet it is also a primary medium for disseminating illicit content.... -
XPORAM: A Practical Multi-client ORAM Against Malicious Adversaries
Oblivious RAM (ORAM) was proposed to solve the problem of memory disclosure, preventing the system from reverse engineering attacks. Naturally,... -
Tor network anonymity evaluation based on node anonymity
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the...
-
Detecting bots in social-networks using node and structural embeddings
Users on social networks such as Twitter interact with each other without much knowledge of the real-identity behind the accounts they interact with....
-
A Novel Robust Soft-Computed Range-Free Localization Algorithm Against Malicious Anchor Nodes
A wireless sensor network consists of a set of low-cost, small, and low-powered sensor nodes. Information about the position of a sensor node is...
-
Detecting Malicious Blockchain Transactions Using Graph Neural Networks
The adoption of blockchain technology within various critical infrastructures is on the rise. Concurrently, there has been a corresponding increase... -
Beneath the Facade of IP Leasing: Graph-Based Approach for Identifying Malicious IP Blocks
With the depletion of IPv4 address resources, the prevalence of IPv4 address leasing services by hosting providers has surged. These services allow... -
A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base
Network intelligence has become an important trend in modern communication networks. In the future 6G network, the unrestricted communication between... -
Ensuring security in edge computing through effective blockchain node detection
The rapid development of blockchain technology has garnered increasing attention, particularly in the field of edge computing. It has become a...
-
A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks
Wireless sensor networks consist of some sensor nodes that have a minimum operational capability, with less memory capacity for storing data and...
-
MF-Net: Encrypted Malicious Traffic Detection Based on Multi-flow Temporal Features
Malicious attacks on the network continue to increase, seriously undermining cyberspace security. As the cost of Transport Layer Security(TLS)... -
SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection
Unix Shell is a powerful tool for system developers and engineers, but it poses serious security risks when used by cybercriminals to execute... -
Countering Malicious DeepFakes: Survey, Battleground, and Horizon
The creation or manipulation of facial appearance through deep generative approaches, known as DeepFake , have achieved significant progress and...
-
Latent Semantic Structure in Malicious Programs
Latent Semantic Analysis is a method of matrix decomposition used for discovering topics and topic weights in natural language documents. This study... -
ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network
With the rapid development of the Internet of Things and its widespread deployment in daily life and production, malicious node detection is becoming... -
Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System
The Internet of Things (IoT) applications are growing immensely. However, malicious IoT devices are major concerns that threaten the security of IoT...
-
Mitigating DoS Attack in MANETs Considering Node Reputation with AI
Mobile Adhoc Network (MANET) is a decentralized and dynamically adoptable network. It is infrastructure-less and hence can be used where a fixed...
-
Heterogeneous Graph Attention Network for Malicious Domain Detection
Domain name system(DNS) is a basic part of the Internet infrastructure, but it is also abused by attackers in various cybercrimes, making the task of... -
A Measurement Study on Interprocess Code Propagation of Malicious Software
The propagation of code from one process to another is an important aspect of many malware families and can be achieved, for example, through code...