SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:UbiSec (1. : 2021 : Kanton, Stadt; Online) Ubiquitous security
1. Verfasser: Koay, Abigail M. Y. (VerfasserIn)
Weitere Verfasser: Xie, Miao (VerfasserIn), Ko, Ryan K. L. (VerfasserIn), Choi, Charles Sterner Taejun (VerfasserIn), Dong, Naipeng (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network 2022 Sharmin, Shaila
A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments 2022 Iosif, Andrei-Cristian
Skill Reward for Safe Deep Reinforcement Learning 2022 Cheng, Jiangchang
Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks 2022 Keipour, Hossein
A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW NB15 Dataset 2022 Rashid, A. N. M. Bazlur
A Robust Malware Detection Approach for Android System Based on Ensemble Learning 2022 Li, Wenjia
Privacy-Preserving Cluster Validity 2022 Yang, Peng
A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN 2022 Liu, Xuehua
Reliable and Controllable Data Sharing Based on Blockchain 2022 Zou, Yipeng
Smart Search over Encrypted Educational Resources in Cloud Storage 2022 Zhang, Qiang
A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals 2022 Wei, Xingshen
Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning 2022 Liu, Wei
A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes 2022 Zhang, Shaobo
Evaluation of an Anomaly Detector for Routers Using Parameterizable Malware in an IoT Ecosystem 2022 Carter, John
Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm 2022 Tang, Yuting
Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System 2022 Corrick, Tristan
Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment 2022 Chen, Hongling
A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks 2022 Liu, Meirong
PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks 2022 Nair, Aiswarya S.
SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets 2022 Koay, Abigail M. Y.
Alle Artikel auflisten