Search alternatives:
networks » network (Expand Search)
Showing 201 - 220 results of 836 for search 'Computer networks Security features.', query time: 0.14s Refine Results
  1. 201

    Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network by Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU

    Published 2023-08-01
    “…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
    Get full text
    Article
  2. 202
  3. 203

    Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet) by Ahmed A. Mohamed, Abdullah Al-Saleh, Sunil Kumar Sharma, Ghanshyam G. Tejani

    Published 2025-02-01
    “…Additionally, a novel “Meta-Attention Transformer Autoencoder (MATA)” for enhancing feature extraction which address the subtlety issue, and improves the model’s ability and flexibility to detect new security threats, and a novel “Genetic Mongoose-Chameleon Optimization (GMCO)” was introduced for effective feature selection in the case of addressing the efficiency challenges. …”
    Get full text
    Article
  4. 204

    A novel integration of multi-stocked gated variant recurrent units and Kolmogorov-Arnold tuned deep training networks for anchoring the intrusion detection against computer attacks by M. Saritha, Saidireddy Malgireddy

    Published 2025-07-01
    “…Abstract With the explosive expansion of smart computers, there is a rapid intrusion of network attacks in the user’s personal life that intensifies the privacy and security breaches. …”
    Get full text
    Article
  5. 205
  6. 206
  7. 207
  8. 208

    Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS) by Pi-Yun Chen, Yu-Cheng Cheng, Zi-Heng Zhong, Feng-Zhou Zhang, Neng-Sheng Pai, Chien-Ming Li, Chia-Hung Lin

    Published 2024-01-01
    “…The internet of medical thing system (IoMTS) comprises the fifth-generation (5G) networking technology that collects and shares digital data from signal- or image-capturing devices through computer and wireless communication networks. …”
    Get full text
    Article
  9. 209
  10. 210
  11. 211
  12. 212
  13. 213
  14. 214
  15. 215
  16. 216
  17. 217
  18. 218
  19. 219

    Legal aspects of functional security standardisation of the Internet of Things by P. S. Klimushyn, V. Ye. Roh, T. P. Kolisnyk

    Published 2023-09-01
    “…The single phenomenon of IoT security has been identified as a complex concept that includes functional security and information security with their interconnection, contradictions, challenges and risks. …”
    Get full text
    Article
  20. 220