An Evaluation of Bitcoin Address Classification based on Transaction History Summarization Authors: Yu-Jing Lin, Po-Wei Wu, Cheng-Han Hsu, I-Ping Tu, Shih-wei Liao | Published: 2019-03-19 取引の流れ特徴選択手法統計的分析 2019.03.19 2025.04.03 文献データベース
Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull | Published: 2018-11-02 IoTトラフィック特性性能評価手法特徴選択手法 2018.11.02 2025.04.03 文献データベース
Malware triage for early identification of Advanced Persistent Threat activities Authors: Giuseppe Laurenza, Riccardo Lazzeretti, Luca Mazzotti | Published: 2018-10-16 マルウェア検出性能評価指標特徴選択手法 2018.10.16 2025.04.03 文献データベース
Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing Authors: Opeyemi Osanaiye, Kim-Kwang Raymond Choo2, Ali Dehghantanha, Zheng Xu, Mqhele Dlodlo | Published: 2018-07-27 モデル評価機械学習の応用特徴選択手法 2018.07.27 2025.04.03 文献データベース
Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware Authors: James Baldwin, Ali Dehghantanha | Published: 2018-07-27 トレーニングプロトコルモデル評価特徴選択手法 2018.07.27 2025.04.03 文献データベース
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection Authors: Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid | Published: 2018-07-22 モデル評価早期検出手法特徴選択手法 2018.07.22 2025.04.03 文献データベース
Intensive Preprocessing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques Authors: Ibrahim Obeidat, Nabhan Hamadneh, Mouhammd Al-kasassbeh, Mohammad Almseidin | Published: 2018-05-26 | Updated: 2018-10-05 データ前処理攻撃検出特徴選択手法 2018.05.26 2025.04.03 文献データベース
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information Authors: Beatrice Perez, Mirco Musolesi, Gianluca Stringhini | Published: 2018-03-27 | Updated: 2018-05-14 プライバシー保護特徴選択手法統計的分析 2018.03.27 2025.04.03 文献データベース
An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods Authors: Mouhammd Alkasassbeh | Published: 2017-12-27 機械学習アルゴリズム特徴選択手法通信システム 2017.12.27 2025.04.03 文献データベース
Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach Authors: Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li | Published: 2017-06-13 | Updated: 2017-10-31 マルウェア分類毒データの検知特徴選択手法 2017.06.13 2025.04.03 文献データベース