Two approaches are available for WSOD: MIL and CAM. MIL-based methods are capable of addressing multiple targets and multiple class problems. However, these methods require the input of region proposals. In contrast, ...
详细信息
In this paper, we have utilized deep learning approaches to detect cloud intrusion for the Internet of Things (IoT). The emerging growth of IoT and cloud environments has revolutionized many industries by allowing rea...
详细信息
As quantum computing progresses towards practical realization, the security of existing cryptographic protocols, such as RSA and Elliptic Curve Cryptography (ECC), faces unprecedented risks. Quantum algorithms like Sh...
详细信息
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulti...
详细信息
ISBN:
(纸本)9798350362480
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulting in less attention and development in this critical area. Conventional ITD approaches often rely heavily on event-driven approaches. On top of that, researchers developed various rule-based methods to conquer the tasks. Based on that, we often ignore the intrinsic temporal relationships that are naturally built in between events that occur in different moments. For instance, we may easily understand events with causality such as one anomalous event followed by another specific event to complete a malicious action;however, may not be aware of events that occur around 9 am every morning during working hours. In our opinion, we attempt to re-consider the temporal behavior to extract the information hidden in cyberspace activities. Specifically, some effective sentence embeddings can assist us in providing informative internal representations to summarize temporal behaviors in the temporal activity sequences to make the right judgment on insider threat detection. In this paper, we propose a novel methodology for insider threat detection that emphasizes temporal relationship modeling on top of already-matured event sequence analysis to effectively catch insider threats. The proposed approach leverages contrastive sentence embeddings to learn users' intentions in sequences, followed by the deployment of a user-level and event-level Contrastive Learning (euCL) model to incorporate temporal behaviors with user behavior embeddings. To validate the proposed methodology, we conduct extensive analyses and experiments using the publicly available CERT dataset. The results demonstrate the effectiveness and robustness of the proposed method in detecting insider threats and identifying malicious scenarios, highlighting its potential for enhancing cybersecurity measur
This paper presents a monocular UAV motion planning method based on the DRL method SDDPG. By processing image data with the self-proposed lightweight dept. estimation model and a pretrained encoder, the information is...
详细信息
The uncontrolled growth of skin cells in the epidermis producing the creation of a mass termed a tumor is a dangerous condition known as skin cancer. Current developments in deep learning artificial intelligence have ...
详细信息
Orthogonal time frequency space (OTFS) modulation is a promising technology for mitigating severe Doppler effects in high-mobility scenarios. However, existing OTFS channel estimation methods neglect the Doppler Squin...
详细信息
In this work, we are interested in automated methods for knowledge graph creation (KGC) from input text. Progress on large language models (LLMs) has prompted a series of recent works applying them to KGC, e.g., via z...
详细信息
In the rapidly advancing field of computer vision, object detection has become crucial for various applications, including animal tracking, face detection, and surveillance systems. This study investigates the efficac...
详细信息
Internet has revolutionized the world in a way no one could have ever imagined. It paved the way for various different technologies, that have transformed the world exceptionally. Internet enabled cloud technology whi...
详细信息
暂无评论