No 3. CS (20) 2023
Papers
-
Extracting Multiple Relations between Entities from Unstructured Threat Intelligence Reports
Abstract views: 999 / PDF downloads: 94
-
Learning Latent Representation with Limited Labels for IoT Anomaly Detection
Abstract views: 908 / PDF downloads: 98
-
Enhancing Web Application Security: A Deep Learning and NLP-based Approach for Accurate Attack Detection
Abstract views: 1207 / PDF downloads: 243
-
A new study for global dynamics and numerical simulation of a discrete-time computer virus propagation model
Abstract views: 855 / PDF downloads: 94
-
A new Takagi-Sugeno fuzzy system approach for fuzzy state feedback controller design and its application to malware propagation on heterogeneous complex network
Abstract views: 1096 / PDF downloads: 105
-
Constructing a Model Combining Zalo and End-to-End Encryption for Application in Digital Transformation
Abstract views: 1784 / PDF downloads: 188
-
A survey on optimization-based approaches to Dynamic Centralized Group Key management
Abstract views: 890 / PDF downloads: 105
-
A review of neural networks for rare intrusions detection in wireless networks
Abstract views: 1007 / PDF downloads: 184
-
A novel generalized adversarial image method using descriptive features
Abstract views: 1032 / PDF downloads: 111
-
Approach to Constructing Symmetric Cryptographic Systems Ensuring Specified Resilience to Cryptoanalysis over the Long-Term Time Horizon
Abstract views: 864 / PDF downloads: 62










