Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Past month
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
May 26, 2024 · APTs are highly sophisticated and stealthy attacks that target enterprise networks with the goal of exfiltrating valuable data or disrupting operations.
May 18, 2024 · After generating negative samples, we pre-train the encoder for the CMA detector using contrastive learning upon the continuous-time dynamic heterogeneous graph ...
May 25, 2024 · In this work we investigate the use of Bayesian Autoencoder (BAE) models for uncertainty quantification in anomaly detection. A novel heteroscedastic aleatoric ...
May 17, 2024 · However, entirely preventing bias in general-purpose AI systems is challenging because it requires systematic training data collection, ongoing evaluation, and ...
May 24, 2024 · Stephanie Simone is the Editor-in-Chief at Database Trends and Applications, a division of Information Today, Inc. She can be reached atssimone@dbta.com.
May 29, 2024 · AI network monitoring, threat detection, pen testing, automated remediation, and predictive analytics are just some of the use cases for AI in cybersecurity.
May 12, 2024 · This paper reviews the developments in the last decade in the use of machine learning models (MLMs) to foster the creation of intelligent solutions targeted at ...
May 14, 2024 · from nation states and well-known advanced persistent threat groups (adversaries with sophisticated levels of expertise and significant resources, allowing ...
May 21, 2024 · ... advanced persistent threat. Liu et al. [70], 2019 ... In addition, intrusion detection using ... We can get learning outcomes and models from the vast IoT data ...