Results 31 to 40 of about 1,290,938 (334)

DGA CapsNet: 1D Application of Capsule Networks to DGA Detection

open access: yesInformation, 2019
Domain generation algorithms (DGAs) represent a class of malware used to generate large numbers of new domain names to achieve command-and-control (C2) communication between the malware program and its C2 server to avoid detection by cybersecurity ...
Daniel S. Berman
doaj   +1 more source

An improved approach for automatic process plan generation of complex borings [PDF]

open access: yes, 2006
The authors are grateful for funding provided to this project by the French Ministry of Industry, Dassault Aviation, Dassault Systemes, and F. Vernadat for his review and recommendations.The research concerns automated generation of process plans using ...
DANTAN, Jean-Yves   +3 more
core   +6 more sources

Survey of Detection Techniques for Domain Generation Algorithm [PDF]

open access: yesJisuanji kexue
The C&C server is an intermediate server used by cyber attackers to control bots,and plays a key role in botnet.In order to enhance the concealment of the C&C server,cyber attackers use domain generation algorithms to hide the IP address of C&
WANG Xuxian, HUANG Jinhua, ZHAI You, LI Chu’nan, WANG Yu, ZHANG Yupeng, ZHANG Yipeng, YANG Liqun, LI Zhoujun
doaj   +1 more source

MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning

open access: yesSensors, 2023
With the development of deepfake technology, deepfake detection has received widespread attention. Although some deepfake forensics techniques have been proposed, they are still very difficult to implement in real-world scenarios.
Lei Guan   +4 more
doaj   +1 more source

Discovery of Nuisance Website Domain Name Generation Based on Domain Name Semantic Information and Similarity [PDF]

open access: yesJisuanji gongcheng
Using domain name generation technology to identify nuisance website domains offers benefits such as broad coverage, the provision of substantial research data, and timely prevention of dissemination. Existing domain generation algorithms based on domain
YU Jie, ZHAO Chunlei, DONG Guozhong, REN Huaishuo, YOU Wei
doaj   +1 more source

Domain Generalization in Machine Learning Models for Wireless Communications: Concepts, State-of-the-Art, and Open Issues [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2023
Data-driven machine learning (ML) is promoted as one potential technology to be used in next-generation wireless systems. This led to a large body of research work that applies ML techniques to solve problems in different layers of the wireless ...
Mohamed Akrout   +4 more
semanticscholar   +1 more source

Data-Aided Versus Blind Single-Carrier Coherent Receivers

open access: yesIEEE Photonics Journal, 2010
Fiber-optic research in signal processing for the first generation of coherent communication systems was dominated by receivers with blind adaptation. Next-generation systems will require a scalable and modular design for higher order modulation formats.
Maxim Kuschnerov   +8 more
doaj   +1 more source

Implementation and Evaluation of Novel Buildstyles in Fused Deposition Modeling (FDM) [PDF]

open access: yes, 1999
Previous investigations have shown that the optimization of extrusion dynamics in .conjunction with the buildstyle pattern is of paramount importance to increase part quality in Fused Deposition Modeling (FDM).
Jayal, Anshu Dhar   +2 more
core   +1 more source

A domain splitting algorithm for the mathematical functions code generator [PDF]

open access: yes2014 48th Asilomar Conference on Signals, Systems and Computers, 2014
The general approach to mathematical function implementation consists of three stages: argument reduction, approximation and reconstruction. The argument reduction step is needed to reduce the degree of the approximation polynomial and to simplify the error analysis. For some particular functions (e.g. exp) it is done using its algebraic properties. In
Kupriianova, Olga, Lauter, Christoph
openaire   +2 more sources

Inline Detection of DGA Domains Using Side Information

open access: yesIEEE Access, 2020
Malware applications typically use a command and control (C&C) server to manage bots to perform malicious activities. Domain Generation Algorithms (DGAs) are popular methods for generating pseudo-random domain names that can be used to establish a
Raaghavi Sivaguru   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy