DDoS attacks involve overwhelming a target system with a large number of...
Since their proposal in the 2014 paper by Ian Goodfellow, there has been...
Machine learning algorithms have been widely used in intrusion detection...
Solutions for rapid prioritization of different ransomware have been rai...
Anomaly detection for indoor air quality (IAQ) data has become an import...
The massive growth of network traffic data leads to a large volume of
da...
The effectiveness of machine learning models is significantly affected b...
The network intrusion detection task is challenging because of the imbal...
The new generation of botnets leverages Artificial Intelligent (AI)
tech...
Ransomware defense solutions that can quickly detect and classify differ...
The rise of the new generation of cyber threats demands more sophisticat...
Network traffic data is a combination of different data bytes packets un...
Cyberspace is full of uncertainty in terms of advanced and sophisticated...
Malware authors apply different obfuscation techniques on the generic fe...
The new generation of cyber threats leverages advanced AI-aided methods,...
Moving Target Defense (MTD) is a proactive security mechanism which chan...
The cloud model allows many enterprises able to outsource computing reso...
Outlier detection is a technique in data mining that aims to detect unus...
Cloud service providers offer their customers with on-demand and
cost-ef...