Filter your results
- 17
- 1
- 18
- 18
- 5
- 2
- 1
- 2
- 5
- 3
- 18
- 18
- 4
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.155-170, ⟨10.1007/978-3-030-58201-2_11⟩
Conference papers
hal-03440839v1
|
||
|
BGElasor: Elastic-Scaling Framework for Distributed Streaming Processing with Deep Neural Network16th IFIP International Conference on Network and Parallel Computing (NPC), Aug 2019, Hohhot, China. pp.120-131, ⟨10.1007/978-3-030-30709-7_10⟩
Conference papers
hal-03770524v1
|
||
|
Towards Discovering Covert Communication Through Email Spam9th International Conference on Intelligent Information Processing (IIP), Nov 2016, Melbourne, VIC, Australia. pp.191-201, ⟨10.1007/978-3-319-48390-0_20⟩
Conference papers
hal-01614994v1
|
||
|
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.261-272, ⟨10.1007/978-3-642-30436-1_22⟩
Conference papers
hal-01518260v1
|
||
|
A Cyclic Cascaded CRFs Model for Opinion Targets Identification Based on Rules and Statistics9th International Conference on Intelligent Information Processing (IIP), Nov 2016, Melbourne, VIC, Australia. pp.267-275, ⟨10.1007/978-3-319-48390-0_27⟩
Conference papers
hal-01614995v1
|
||
Malicious login detection using long short-term memory with an attention mechanism17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.157-173, ⟨10.1007/978-3-030-88381-2_8⟩
Conference papers
hal-03764375v1
|
|||
|
DROAllocator: A Dynamic Resource-Aware Operator Allocation Framework in Distributed Streaming Processing17th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2020, Zhengzhou, China. pp.349-360, ⟨10.1007/978-3-030-79478-1_30⟩
Conference papers
hal-03768731v1
|
||
|
Hashing Incomplete and Unordered Network Streams14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.199-224, ⟨10.1007/978-3-319-99277-8_12⟩
Conference papers
hal-01988840v1
|
||
|
Extracting threat intelligence relations using distant supervision and neural networks17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.193-211, ⟨10.1007/978-3-030-88381-2_10⟩
Conference papers
hal-03764377v1
|
||
|
Convolutional Neural Networks Optimized by Logistic Regression Model9th International Conference on Intelligent Information Processing (IIP), Nov 2016, Melbourne, VIC, Australia. pp.91-96, ⟨10.1007/978-3-319-48390-0_10⟩
Conference papers
hal-01614983v1
|
||
|
A Task-Based Model for the Lifespan of Peer-to-Peer Swarms11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.71-83, ⟨10.1007/978-3-642-30054-7_6⟩
Conference papers
hal-01531955v1
|
||
|
A Cluster-Based Multilevel Security Model for Wireless Sensor Networks7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.320-330, ⟨10.1007/978-3-642-32891-6_40⟩
Conference papers
hal-01524956v1
|
||
|
Event Detection with Convolutional Neural Networks for Forensic Investigation9th International Conference on Intelligent Information Processing (IIP), Nov 2016, Melbourne, VIC, Australia. pp.97-107, ⟨10.1007/978-3-319-48390-0_11⟩
Conference papers
hal-01614980v1
|
||
|
KT-Store: A Key-Order and Write-Order Hybrid Key-Value Store with High Write and Range-Query Performance15th IFIP International Conference on Network and Parallel Computing (NPC), Nov 2018, Muroran, Japan. pp.64-76, ⟨10.1007/978-3-030-05677-3_6⟩
Conference papers
hal-02279544v1
|
||
|
Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.57-72, ⟨10.1007/978-3-030-56223-6_4⟩
Conference papers
hal-03657237v1
|
||
|
Opinion Targets Identification Based on Kernel Sentences Extraction and Candidates Selection9th International Conference on Intelligent Information Processing (IIP), Nov 2016, Melbourne, VIC, Australia. pp.152-159, ⟨10.1007/978-3-319-48390-0_16⟩
Conference papers
hal-01615005v1
|
||
|
MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER17th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2020, Zhengzhou, China. pp.43-54, ⟨10.1007/978-3-030-79478-1_4⟩
Conference papers
hal-03768765v1
|
||
|
Detecting malicious pdf documents using semi-supervised machine learning17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.135-155, ⟨10.1007/978-3-030-88381-2_7⟩
Conference papers
hal-03764374v1
|