Botnet Attack Identification Based on SDN

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Symposium on Cyber Security, Cryptography and Machine Learning (6. : 2022 : Online) Cyber security, cryptography and machine learning
1. Verfasser: Dimiter, Avresky (VerfasserIn)
Weitere Verfasser: Dobrev, Dobrin (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Monitoring Time Series with Missing Values: A Deep Probabilistic Approach 2022 Barazani, Oshri
Randomness for Randomness Testing 2022 Berend, Daniel
Predicting the Direction of Changes in the Values of Time Series for Relatively Small Training Samples 2022 Frenkel, Sergey
Design of Intrusion Detection System Based on Logical Analysis of Data (LAD) Using Information Gain Ratio 2022 Chauhan, Sneha
Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting 2022 Boskov, Novak
Botnet Attack Identification Based on SDN 2022 Dimiter, Avresky
Transfer Learning for Time Series Classification Using Synthetic Data Generation 2022 Rotem, Yarden
Simulating a Coupon Collector 2022 Barak-Pelleg, Dina
Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling 2022 Hayoon, Hen
Privacy-Preserving Contrastive Explanations with Local Foil Trees 2022 Veugen, Thijs
Counter Mode for Long Messages and a Long Nonce 2022 Gueron, Shay
Machine-Learning Based Objective Function Selection for Community Detection 2022 Bornstein, Asa
Reinforcement Based User Scheduling for Cellular Communications 2022 Gradus, Nimrod
A Heuristic Framework to Search for Approximate Mutually Unbiased Bases 2022 Chaudhury, Sreejit
Timing Leakage Analysis of Non-constant-time NTT Implementations with Harvey Butterflies 2022 Drucker, Nir
Non-stopping Junctions via Traffic Scheduling 2022 Dolev, Shlomi
Faster Post-Quantum TLS Handshakes Without Intermediate CA Certificates 2022 Kampanakis, Panos
Detecting Clickbait in Online Social Media: You Won’t Believe How We Did It 2022 Elyashar, Aviad
Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum 2022 Andrews, John
Fake News Detection in Social Networks Using Machine Learning and Trust 2022 Voloch, Nadav
Alle Artikel auflisten