-
Chapter and Conference Paper
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model
Although being isolated from the external network, the private network is still faced with some security threats, such as violations communications, malware attacks, and illegal operations. It is an attractive...
-
Chapter and Conference Paper
An Effective Remote Data Disaster Recovery Plan for the Space TT&C System
The critical asset data of the Space Tracking Telemetry and Command (TT&C) System plays an important role in fulfilling space missions. According to analyze the current storing methods and disaster recovery re...
-
Chapter and Conference Paper
Cross-Project Software Defect Prediction Based on Feature Selection and Transfer Learning
Cross-project software defect prediction solves the problem that traditional defect prediction can’t get enough data, but how to apply the model learned from the data of different mechanisms to the target data...
-
Chapter and Conference Paper
A Malware Classification Method Based on the Capsule Network
Malware has become a serious threat to network security. Traditional static analysis methods usually cannot effectively detect packers, obfuscations, and variants. Dynamic analysis is not efficient when dealin...
-
Chapter and Conference Paper
Detection of Malicious Domains in APT via Mining Massive DNS Logs
With the rise of network attack, advanced persistent threats (APT) imposes severe challenges to network security. Since APT attacker can easily hide inevitable C&C traffic in massive Web traffic, HTTP-based C...