„Malicious software“
Suchergebnisse
1.000+ Treffer
-
Malicious Query Recognition Using Chosen Machine Learning Techniques
-
Malicious Attack Detection in IoT by Generative Adversarial Networks
-
A Study on Machine Learning and Deep Learning Techniques for Identifying Malicious Web Content
-
CSForest: an approach for imbalanced family classification of android malicious applications
-
Enhanced route optimization technique and design of threshold-T for malicious node detection in ad hoc networks
-
Malicious node analysis in MANETS
-
HONEYDOS: a hybrid approach using data mining and honeypot to counter denial of service attack and malicious packets
-
DMAFL: Effective defense against malicious attacker federated learning framework via blockchain and TFHE
-
MalModel: hiding malicious payload in mobile deep learning models with black-box backdoor attack
-
Malicious Bits and How to Fight Them
-
Towards Detection of Malicious Software Packages Through Code Reuse by Malevolent Actors
-
Expanding Malware Defense by Securing Software Installations
-
Mitigating the imposition of malicious behaviour on code
-
Blockchain-based federated learning framework for malicious node detection in internet of vehicles (IoV) networks using fog and cloud computing
-
A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks
-
Detecting malicious nodes using game theory and reinforcement learning in software-defined networks
-
Experimenting and assessing machine learning tools for detecting and analyzing malicious behaviors in complex environments
-
Waterwheel Archimedes Optimization and Resilient Consensus BiLSTM for Efficient Data Aggregation to Detect and Discard Malicious Nodes and Packets in IoT-Based Healthcare Applications
-
Malicious software identification based on deep learning algorithms and API feature extraction
-
Optimizing malicious website prediction: An advanced XGBoost-based machine learning model