Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2973700
Abstract: File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works…
read more here.
Keywords:
access;
file;
based deception;
file based ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2022.3142626
Abstract: A human contact network (HCN) consists of individuals moving around and interacting with each other. In HCN, it is essential to detect malicious users who break the data delivery through terminating the data delivery or…
read more here.
Keywords:
malicious users;
rate;
users detection;
human contact ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Knowledge and Data Engineering"
DOI: 10.1109/tkde.2020.3040618
Abstract: In e-commerce, online retailers are usually suffering from professional malicious users (PMUs), who utilize negative reviews and low ratings to their consumed products on purpose to threaten the retailers for illegal profits. PMUs are difficult…
read more here.
Keywords:
malicious users;
metric learning;
professional malicious;
detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "International Journal of Antennas and Propagation"
DOI: 10.1155/2018/2346317
Abstract: In cognitive radio network (CRN), secondary users (SUs) try to sense and utilize the vacant spectrum of the legitimate primary user (PU) in an efficient manner. The process of cooperation among SUs makes the sensing…
read more here.
Keywords:
user;
malicious users;
spectrum sensing;
genetic algorithm ... See more keywords