Results 21 to 30 of about 1,328,609 (285)

Learning From Few Cyber-Attacks: Addressing the Class Imbalance Problem in Machine Learning-Based Intrusion Detection in Software-Defined Networking

open access: yesIEEE Access, 2023
The class imbalance problem negatively impacts learning algorithms’ performance in minority classes which may constitute more severe attacks than the majority ones.
Seyed Mohammad Hadi Mirsadeghi   +3 more
doaj   +1 more source

An Efficient and Dynamic Semantic-Aware Multikeyword Ranked Search Scheme Over Encrypted Cloud Data

open access: yesIEEE Access, 2019
Traditional searchable encryption schemes adopting the bag-of-words model occupy massive space to store the document set's index, where the dimension of the document vector is equal to the scale of the dictionary.
Xuelong Dai   +4 more
doaj   +1 more source

An Adaptive Ensemble Machine Learning Model for Intrusion Detection

open access: yesIEEE Access, 2019
In recent years, advanced threat attacks are increasing, but the traditional network intrusion detection system based on feature filtering has some drawbacks which make it difficult to find new attacks in time.
Xianwei Gao   +4 more
doaj   +1 more source

Medical Device Safety Management Using Cybersecurity Risk Analysis

open access: yesIEEE Access, 2020
Hospital biomedical engineering teams are responsible for establishing and regulating medical equipment management programs (MEMPs); these programs ensure the safety and reliability of medical devices.
Dong-Won Kim   +2 more
doaj   +1 more source

Tunable band-structures of MSe2/C3N (M = Mo and W) van der Waals Heterojunctions

open access: yesMaterials Research Express, 2023
Van der Waals (vdW) heterojunctions constructed using two-dimensional (2D) materials have shown excellent properties for applications in various fields. In this study, the structural and electronic properties of 2D MoSe _2 /C _3 N and WSe _2 /C _3 N vdW ...
Zixiang Liu   +4 more
doaj   +1 more source

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

open access: yes, 2017
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Böhme, Rainer   +7 more
core   +1 more source

Increased security through open source [PDF]

open access: yes, 2007
In this paper we discuss the impact of open source on both the security and transparency of a software system. We focus on the more technical aspects of this issue, combining and extending arguments developed over the years. We stress that our discussion
Anderson R.   +3 more
core   +6 more sources

Android Malware Detection Method Combining Multi-Frequency Features and Convolutional Neural Networks

open access: yesIEEE Access
With the rapid evolution of Android malware variants, traditional detection methods exhibit significant limitations in addressing complex patterns and adversarial attacks.
Jian Wang   +4 more
doaj   +1 more source

Quantum classical hybrid convolutional neural networks for breast cancer diagnosis

open access: yesScientific Reports
The World Health Organization states that early diagnosis is essential to increasing the cure rate for breast cancer, which poses a danger to women’s health worldwide.
Qiuyu Xiang   +8 more
doaj   +1 more source

Community-Based Security for the Internet of Things

open access: yes, 2018
With more and more devices becoming connectable to the internet, the number of services but also a lot of threats increases dramatically. Security is often a secondary matter behind functionality and comfort, but the problem has already been recognized ...
Börgers   +12 more
core   +1 more source

Home - About - Disclaimer - Privacy