SF-IDS improves cyber defense with semi-supervised learning and hybrid loss function.
― 5 min read
Cutting edge science explained simply
SF-IDS improves cyber defense with semi-supervised learning and hybrid loss function.
― 5 min read
A new approach to enhance the security of autonomous vehicles against cyber threats.
― 4 min read
AutoML4ETC automates the creation of neural networks for classifying encrypted network traffic.
― 7 min read
Enhancing 5G protocol verification using advanced analysis methods.
― 5 min read
Ensuring safety in interconnected industrial control systems is crucial amidst rising cyber threats.
― 5 min read
Learn how distributed authorization improves network security and access management.
― 5 min read
This article discusses advanced learning methods for SDN security.
― 5 min read
Exploring fairness in DLTs, particularly through the lens of DAG-based systems.
― 6 min read
Research shows deep reinforcement learning can improve IoT security.
― 5 min read
A look at machine learning's role in combating cyber threats.
― 6 min read
A new method improves network traffic management while protecting user privacy.
― 6 min read
Analysis of unexpected DNS query patterns and their impact on internet operations.
― 6 min read
Learn how to find anomalies in graph data effectively.
― 5 min read
This study explores OOD techniques to improve network intrusion detection systems.
― 7 min read
HRGCN improves anomaly detection in complex systems without labeled data.
― 5 min read
A method to identify QUIC libraries helps enhance security and performance online.
― 5 min read
MONDEO combats botnet malware using effective detection methods for mobile devices.
― 7 min read
A look at Mahalanobis distance and innovative approaches for data analysis.
― 5 min read
A method to ensure reliable consensus among agents despite malicious behavior.
― 5 min read
Exploring Moving Target Defense strategies to combat advanced cyber threats and uncertainties.
― 7 min read
A novel approach to improve security against harmful web traffic.
― 5 min read
Examining the threats to Specific Emitter Identification through advanced mimicry techniques.
― 6 min read
A detailed look at security flaws in MQTT for IoT devices.
― 6 min read
This article reviews IPv6 fragmentation issues and security risks in current operating systems.
― 6 min read
Examining Nash equilibria in network scenarios involving attackers and defenders.
― 7 min read
This article explores the integration of NOMA and PLS for improved wireless security.
― 6 min read
A new approach to detecting malicious activities in cyber systems using modern data analysis.
― 5 min read
AIDPS enhances security for underwater sensor networks against various attacks.
― 5 min read
New method improves detection of unknown attacks in IoT environments.
― 5 min read
Learn how anomaly detection can enhance wireless network reliability against interference.
― 5 min read
Introducing XFedHunter for advanced detection and analysis of APT attacks in networks.
― 10 min read
Learn how the REVEAL protocol secures wireless networks from MiM attacks.
― 6 min read
A study on enhancing security and performance in NOMA wireless networks.
― 7 min read
Study of untrusted users in NOMA with imperfect SIC.
― 6 min read
NOMA presents unique security risks due to shared channels among multiple users.
― 5 min read
A novel approach to address security challenges in NOMA systems affected by residual interference.
― 6 min read
An open-source toolkit for efficient DNS measurement and research.
― 7 min read
Examining how attackers exploit cloud services and their scanning behaviors.
― 5 min read
Examining new modulation methods for enhanced wireless communication.
― 5 min read
A tool improves router vendor identification and its impact on network security.
― 5 min read