-
21
-
22
Anomaly detection in multivariate time series using ensemble method
Published 2022Get full text
Thesis-Master by Research -
23
Adaptation of object detection networks under anomalous conditions
Published 2023Get full text
Final Year Project (FYP) -
24
Stealthy and robust glitch injection attack on deep learning accelerator for target with variational viewpoint
Published 2021Get full text
Journal Article -
25
EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs /
Published 2023“…You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis. …”
Get full text
Get full text
software, multimedia -
26
“Better Networks” Project is Working to Improve Cybersecurity
Published 2024“…In collaboration with the MIT Sociotechnical Systems Research Center and the Air Force, the Lincoln Laboratory Supercomputing Center is working to develop better sensors using Laboratory developed Dynamic Distributed Dimensional Data Model (D4M) technology and artificial intelligence algorithms to support defensive cyber operations.…”
Get full text
Article -
27
Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization /
Published 2023“…By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.…”
Get full text
Get full text
software, multimedia -
28
Handbook of Research on Deep Learning Techniques for Cloud-Based Industrial IoT /
Published 2023Get full text
software, multimedia -
29
Malicious JavaScript detection web service
Published 2016“…Thus, the detection and prevention of Malicious JavaScript has always been an important research topics in cyber security. Many studies on malicious JavaScript detection were carried out and various detection tools were developed. …”
Get full text
Final Year Project (FYP) -
30
-
31
Security Orchestration, Automation, and Response for Security Analysts : Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture /
Published 2023“…You'll start with a refresher on the importance of understanding cyber security, diving into why traditional tools are no longer helpful and how SOAR can help. …”
Get full text
Get full text
software, multimedia -
32
A byte sequence is worth an image: CNN for file fragment classification using bit shift and n-gram embeddings
Published 2024Get full text
Conference Paper -
33
Cognizant multitasking in multiobjective multifactorial evolution : MO-MFEA-II
Published 2021Get full text
Journal Article -
34
Two sides of the same coin : boons and banes of machine learning in hardware security
Published 2022Get full text
Journal Article -
35
Streamlining Organizational Processes Through AI, IoT, Blockchain, and Virtual Environments /
Published [202Get full text
software, multimedia -
36
-
37
-
38
-
39
OST: a heuristic-based orthogonal partitioning algorithm for dynamic hierarchical data visualization
Published 2022Get full text
Journal Article -
40
A wholistic optimization of containerized workflow scheduling and deployment in the cloud–edge environment
Published 2022Get full text
Journal Article