Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version) Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23 ネットワーク脅威検出研究方法論透かし 2025.04.23 2025.05.12 Literature Database
A Collaborative Intrusion Detection System Using Snort IDS Nodes Authors: Tom Davies, Max Hashem Eiza, Nathan Shone, Rob Lyon | Published: 2025-04-23 ネットワーク脅威検出マルウェア検出手法透かし 2025.04.23 2025.05.12 Literature Database
Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26 ネットワーク脅威検出ユーザー活動解析学習の改善 2025.01.26 2025.05.12 Literature Database
AI/ML Based Detection and Categorization of Covert Communication in IPv6 Network Authors: Mohammad Wali Ur Rahman, Yu-Zheng Lin, Carter Weeks, David Ruddell, Jeff Gabriellini, Bill Hayes, Salim Hariri, Edward V. Ziegler Jr | Published: 2025-01-18 IPv6セキュリティネットワーク脅威検出通信解析 2025.01.18 2025.05.12 Literature Database
Adaptive Cybersecurity: Dynamically Retrainable Firewalls for Real-Time Network Protection Authors: Sina Ahmadi | Published: 2025-01-14 サイバーセキュリティネットワーク脅威検出動的ファイアウォール 2025.01.14 2025.05.12 Literature Database
A Novel Approach to Network Traffic Analysis: the HERA tool Authors: Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-01-13 サイバーセキュリティデータセット生成ネットワーク脅威検出 2025.01.13 2025.05.12 Literature Database
Efficient Phishing URL Detection Using Graph-based Machine Learning and Loopy Belief Propagation Authors: Wenye Guo, Qun Wang, Hao Yue, Haijian Sun, Rose Qingyang Hu | Published: 2025-01-12 ネットワーク脅威検出フィッシング検出収束分析 2025.01.12 2025.05.12 Literature Database
BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction Authors: Alaeddine Diaf, Abdelaziz Amara Korba, Nour Elislem Karabadji, Yacine Ghamri-Doudane | Published: 2025-01-03 サイバーセキュリティネットワーク脅威検出フレームワーク 2025.01.03 2025.05.12 Literature Database
Detection and classification of DDoS flooding attacks by machine learning method Authors: Dmytro Tymoshchuk, Oleh Yasniy, Mykola Mytnyk, Nataliya Zagorodna, Vitaliy Tymoshchuk | Published: 2024-12-25 | Updated: 2025-01-02 サイバーセキュリティネットワーク脅威検出 2024.12.25 2025.05.12 Literature Database
QML-IDS: Quantum Machine Learning Intrusion Detection System Authors: Diego Abreu, Christian Esteve Rothenberg, Antonio Abelem | Published: 2024-10-07 サイバーセキュリティネットワーク脅威検出 2024.10.07 2025.05.12 Literature Database