2 năm trước
With the continuous growth of the internet and web applications, billions of websites built and available at our fingertips today lead more and more sophisticated and malicious attacks and pose requirements to build more precise and modern Web Attack Detection (WAD) system. Nowadays, many Machine Learning (ML)-based WAD approaches have…
Đọc tiếp >>>2 năm trước
In recent years, the advancements in the Internet of Medical Things (IoMT) or smart devices have enabled the automatic monitoring of human health. Using smart healthcare devices can not only reduce the burden on hospitals but also save costs, travel time, and provide a way to diagnose diseases at home,…
Đọc tiếp >>>2 năm trước
An increasing number of devices are connecting to the Internet via Wi-Fi networks, ranging from mobile phones to Internet of Things (IoT) devices. Moreover, Wi-Fi technology has undergone gradual development, with various standards and implementations. In a Wi-Fi network, a Wi-Fi client typically uses the Transmission Control Protocol (TCP) for…
Đọc tiếp >>>2 năm trước
Nowadays, in the realm of blockchain technology, a pressing challenge lies in the current lack of interoperability, which significantly limits its potential for innovation and advancement. However, the attainment of cross-chain interoperability is undeniable of utmost importance, as it holds the key to maximizing the network’s computing performance, expanding storage…
Đọc tiếp >>>2 năm trước
The recent explosion in the number and advancement of cyberattacks induces the deployment of machine learning (ML)-based network intrusion detection systems (NIDS) in the network infrastructure of each corporation. However, there are plenty of difficulties for enterprise organization in training a conventional ML-based IDS, such as the data shortage, the…
Đọc tiếp >>>2 năm trước
Advanced persistent threats (APT) are increasingly sophisticated and pose a significant threat to organizations’ cybersecurity. Detecting APT attacks in a timely manner is crucial to prevent significant damage. However, hunting for APT attacks requires access to large amounts of sensitive data, which is typically spread across different organizations. This makes…
Đọc tiếp >>>2 năm trước
Recently, the application of machine learning (ML) in the field of cybersecurity, particularly in the detection and prevention of malware, has received significant attention and interest. Numerous research works on malware analysis have been proposed, showing promising results for practical applications. In such works, the use of Generative Adversarial Networks…
Đọc tiếp >>>