We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 10,000 results
  1. Dom-BERT: Detecting Malicious Domains with Pre-training Model

    Domain Name System (DNS) is widely abused by attackers, which thus makes malicious domain detection a crucial routine task for operators to combat...
    Yu Tian, Zhenyu Li in Passive and Active Measurement
    Conference paper 2024
  2. Semi-supervised Malicious Domain Detection Based on Meta Pseudo Labeling

    The Domain Name System (DNS) is a crucial infrastructure of the Internet, yet it is also a primary medium for disseminating illicit content....
    Yi Gao, Fangfang Yuan, ... Yanbing Liu in Computational Science – ICCS 2024
    Conference paper 2024
  3. XPORAM: A Practical Multi-client ORAM Against Malicious Adversaries

    Oblivious RAM (ORAM) was proposed to solve the problem of memory disclosure, preventing the system from reverse engineering attacks. Naturally,...
    Biao Gao, Shijie Jia, ... Peixin Ren in Information Security and Cryptology
    Conference paper 2024
  4. Tor network anonymity evaluation based on node anonymity

    In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the...

    Jun Cui, Changqi Huang, ... Ran Wei in Cybersecurity
    Article Open access 08 November 2023
  5. Detecting bots in social-networks using node and structural embeddings

    Users on social networks such as Twitter interact with each other without much knowledge of the real-identity behind the accounts they interact with....

    Ashkan Dehghan, Kinga Siuta, ... Paweł Prałat in Journal of Big Data
    Article Open access 19 July 2023
  6. A Novel Robust Soft-Computed Range-Free Localization Algorithm Against Malicious Anchor Nodes

    A wireless sensor network consists of a set of low-cost, small, and low-powered sensor nodes. Information about the position of a sensor node is...

    Seyed Saber Banihashemian, Fazlollah Adibnia in Cognitive Computation
    Article 18 May 2021
  7. Detecting Malicious Blockchain Transactions Using Graph Neural Networks

    The adoption of blockchain technology within various critical infrastructures is on the rise. Concurrently, there has been a corresponding increase...
    Samantha Tharani Jeyakumar, Andrew Charles Eugene Yugarajah, ... Vallipuram Muthukkumarasamy in Distributed Ledger Technology
    Conference paper 2024
  8. Beneath the Facade of IP Leasing: Graph-Based Approach for Identifying Malicious IP Blocks

    With the depletion of IPv4 address resources, the prevalence of IPv4 address leasing services by hosting providers has surged. These services allow...
    Zhenni Liu, Yong Sun, ... Qingyun Liu in Computational Science – ICCS 2024
    Conference paper 2024
  9. A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base

    Network intelligence has become an important trend in modern communication networks. In the future 6G network, the unrestricted communication between...
    OuYang Liu, Kun Li, ... Huachun Zhou in Mobile Internet Security
    Conference paper 2023
  10. Ensuring security in edge computing through effective blockchain node detection

    The rapid development of blockchain technology has garnered increasing attention, particularly in the field of edge computing. It has become a...

    Shenqiang Wang, Zhaowei Liu, ... Jian** Wang in Journal of Cloud Computing
    Article Open access 15 June 2023
  11. A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks

    Wireless sensor networks consist of some sensor nodes that have a minimum operational capability, with less memory capacity for storing data and...

    R. S. Raghav, Debnath Bhattacharyya, ... Tai-hoon Kim in Personal and Ubiquitous Computing
    Article 08 November 2021
  12. MF-Net: Encrypted Malicious Traffic Detection Based on Multi-flow Temporal Features

    Malicious attacks on the network continue to increase, seriously undermining cyberspace security. As the cost of Transport Layer Security(TLS)...
    Guangchun Yue, Yanlong Zhai, ... Liehuang Zhu in Blockchain and Trustworthy Systems
    Conference paper 2024
  13. SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection

    Unix Shell is a powerful tool for system developers and engineers, but it poses serious security risks when used by cybercriminals to execute...
    Songyue Chen, Rong Yang, ... Qingyun Liu in Information Security
    Conference paper 2023
  14. Countering Malicious DeepFakes: Survey, Battleground, and Horizon

    The creation or manipulation of facial appearance through deep generative approaches, known as DeepFake , have achieved significant progress and...

    Felix Juefei-Xu, Run Wang, ... Yang Liu in International Journal of Computer Vision
    Article 04 May 2022
  15. Latent Semantic Structure in Malicious Programs

    Latent Semantic Analysis is a method of matrix decomposition used for discovering topics and topic weights in natural language documents. This study...
    John Musgrave, Temesguen Messay-Kebede, ... Anca Ralescu in Modelling and Development of Intelligent Systems
    Conference paper 2023
  16. ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network

    With the rapid development of the Internet of Things and its widespread deployment in daily life and production, malicious node detection is becoming...
    **gxiu Yang, Lu Zhou, ... Zuchao Ma in Wireless Algorithms, Systems, and Applications
    Conference paper 2021
  17. Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System

    The Internet of Things (IoT) applications are growing immensely. However, malicious IoT devices are major concerns that threaten the security of IoT...

    Qussai Yaseen, Yaser Jararweh in Journal of Network and Systems Management
    Article 17 June 2021
  18. Mitigating DoS Attack in MANETs Considering Node Reputation with AI

    Mobile Adhoc Network (MANET) is a decentralized and dynamically adoptable network. It is infrastructure-less and hence can be used where a fixed...

    Subrata Joardar, Nilanjan Sinhababu, ... Prasenjit Choudhury in Journal of Network and Systems Management
    Article 07 June 2023
  19. Heterogeneous Graph Attention Network for Malicious Domain Detection

    Domain name system(DNS) is a basic part of the Internet infrastructure, but it is also abused by attackers in various cybercrimes, making the task of...
    Zhi** Li, Fangfang Yuan, ... Jianlong Tan in Artificial Neural Networks and Machine Learning – ICANN 2022
    Conference paper 2022
  20. A Measurement Study on Interprocess Code Propagation of Malicious Software

    The propagation of code from one process to another is an important aspect of many malware families and can be achieved, for example, through code...
    Thorsten Jenke, Simon Liessem, ... Lilli Bruckschen in Digital Forensics and Cyber Crime
    Conference paper 2024
Did you find what you were looking for? Share feedback.