Author:
Bowen Brandon,Chennamaneni Anitha,Goulart Ana,Lin Daisy
Funder
Air Force Research Laboratory
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference56 articles.
1. Aarthi, B., Shafana J.N., Flavia, J., Chelliah, B.J.: A hybrid multiclass classifier approach for the detection of malicious domain names using RNN model. In: Smys, S., Tavares, J.M.R.S., Balas, V.E. (eds.) Computational Vision and Bio-Inspired Computing (Singapore), pp. 471–482. Singapore (2022). https://doi.org/10.1007/978-981-16-9573-5_35
2. Abdalgawad, N., Sajun, A., Kaddoura, Y., Zualkernan, I.A., Aloul, F.: Generative deep learning to detect cyberattacks for the IoT-23 dataset. IEEE Access 10, 6430–6441 (2022)
3. Allyn, B.: 22 texas towns hit with ransomware attack in ‘new front’ of cyberassault (2019). https://www.npr.org/2019/08/20/752695554/23-texas-towns-hit-with-ransomware-attack-in-new-front-of-cyberassault
4. Altini, M.: Dealing with imbalanced data: undersampling, oversampling, and proper cross-validation (2015). https://www.marcoaltini.com/blog/dealing-with-imbalanced-data-undersampling-oversampling-and-proper-cross-validation
5. Berman, D.S., Buczak, A.L., Chavis, J.S., Corbett, C.L.: A survey of deep learning methods for cyber security. Information 10(4) (2019). https://www.mdpi.com/2078-2489/10/4/122
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献