AgCrP2S6 reveals a momentum‐indirect band edge (≈1.35 eV) and chain‐locked linear dichroism: the first direct transitions emerge at 1.6–1.8 eV for E||a. Resonant Raman and photoemission corroborate this assignment. In ACPS/graphene heterostructures, photocurrent turns on above ≈1.5 eV and follows the same polarization selection rules (anisotropy ≈0.53),
Oleksandr Volochanskyi +9 more
wiley +1 more source
Modelling of hybrid deep learning framework with recursive feature elimination for distributed denial of service attack detection systems. [PDF]
Alkhliwi S.
europepmc +1 more source
Network intrusion detection using a hybrid graph-based convolutional network and transformer architecture. [PDF]
Appiahene P +6 more
europepmc +1 more source
Enhancing network traffic detection via interpolation augmentation and contrastive learning. [PDF]
Li L, Zhou Q, Yang X, Chen L.
europepmc +1 more source
HED-ID: an edge-deployable and explainable intrusion detection system optimized via metaheuristic learning. [PDF]
Nasir K +7 more
europepmc +1 more source
Nature-inspired swarm optimization paradigms for securing semantic web frameworks against DDoS attacks: a computational approach. [PDF]
Ganguli C +3 more
europepmc +1 more source
Orchestrating machine learning models in a swarm architecture for IoT inline malware detection. [PDF]
Hanif M +5 more
europepmc +1 more source
Related searches:
Network Attack Detection based on Domain Attack Behavior Analysis
2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2020Network security has become an important issue in our work and life. Hackers' attack mode has been upgraded from normal attack to APT( Advanced Persistent Threat, APT) attack. The key of APT attack chain is the penetration and intrusion of active directory, which can not be completely detected via the traditional IDS and antivirus software.
Weifeng Wang +5 more
openaire +1 more source
Attack detection in large networks
Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2002Attacks on large networks are detected using their inherent statistical characteristics. Emphasis is on detecting attacks on the network instead of attacks on computers attached to the network. Denial-of-Service (DoS) attacks and attacks on network components such as routers are detected.
J. May, J. Peterson, J. Bauman
openaire +1 more source
Network Attack Detection and Mitigation
2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2015Resource exhaustion attacks or denial of service attacks (DoS) have emerged as a major way to compromise the availability of servers and interrupt legitimate online services. IP trace back refers to the problem of identifying the source of such attacks. Packet marking is a general technique to trace back attackers. The main idea in packet marking is to
Sangita Roy, Ashok Singh Sairam
openaire +1 more source

