Network Security Situation Assessment Method Based on MHSA-FL Model

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:FCS (4. : 2021 : Haikou) Frontiers in cyber security
1. Verfasser: Zhang, Kejun (VerfasserIn)
Weitere Verfasser: Jiang, Xinrui (VerfasserIn), Yu, Xinying (VerfasserIn), Feng, Liwen (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Architecture and Security Analysis of Federated Learning-Based Automatic Modulation Classification 2022 Wei, Xianglin
Correlation Power Analysis and Protected Implementation on Block Cipher RainDrop 2022 Gao, Zhixuan
DACN: Malware Classification Based on Dynamic Analysis and Capsule Networks 2022 Zou, Binghui
GWDGA: An Effective Adversarial DGA 2022 Shu, Xiang
Research on Automatic Analysis and Exploitation Technology of Remote Code Execution Vulnerability for Grid System 2022 Wu, Hongwen
New Federation Algorithm Based on End-Edge-Cloud Architecture for Smart Grid 2022 Ji, Xin
Certificateless Authentication and Consensus for the Blockchain-Based Smart Grid 2022 Nkurunziza, Egide
Network Security Situation Assessment Method Based on MHSA-FL Model 2022 Zhang, Kejun
A Hybrid Network Intrusion Detection Model Based on CNN-LSTM and Attention Mechanism 2022 Mu, Jieru
Survey of 3D Printer Security Offensive and Defensive 2022 Zhang, Jiayuan
Identification of Synthetic Spoofed Speech with Deep Capsule Network 2022 Mao, Terui
A GDIoU Loss Function-Based YOLOv4 Deep Learning Network for High-Performance Insulator Location in Field Images 2022 Ma, Bin
Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding 2022 Tandoh, Lawrence
A Privacy-Preserving Medical Image Scheme Based on Secret Sharing and Reversible Data Hiding 2022 Cheng, Ming
Research on Security Assessment of Cross Border Data Flow 2022 Na, Wang
A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning 2022 Li, Ying
Imperceptible and Reliable Adversarial Attack 2022 Zhang, Jiawei
Multi-modal Universal Embedding Representations for Language Understanding 2022 Luo, Xi
Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports 2022 Ren, Hansong
Information System Security Risk Assessment Based on Entropy Weight Method - Bayesian Network 2022 Lv, Xinjian
Alle Artikel auflisten