To search, Click below search items.
All Published Papers Search Service
Title
Proposing a New Approach for Detecting Malware Based on the Event Analysis Technique
Author
Vu Ngoc Son
Vol. 23 No. 12 pp. 107-114
Keywords
Malware detection; Endpoint; Event analysis technique; deep learning; Doc2Vec
Securing SCADA Systems: A Comprehensive Machine Learning Approach for Detecting Reconnaissance Attacks
Ezaz Aldahasi and Talal Alkharobi
Vol. 23 No. 12 pp. 1-12
SCADA/ICS security; Reconnaissance attacks; Critical infrastructure; Imbalanced dataset handling techniques; Ensemble methods; Feature Engineering
Novel Optimizer AdamW+ implementation in LSTM Model for DGA Detection
Awais Javed, Adnan Rashdi, Imran Rashid, Faisal Amir
Vol. 23 No. 11 pp. 133-141
DGA Detection, Deep learning, LSTM, Adam, AdamW AdamW+.
Cyber Threat Intelligence Traffic Through Black Widow Optimisation by Applying RNN-BiLSTM Recognition Model
Kanti Singh Sangher, Archana Singh, Hari Mohan Pandey
Vol. 23 No. 11 pp. 99-109
Darknet, Deep Learning, Cyber Attack, Feature Selection, Feature Extraction..