Cargando…
Graph neural networks and cross-protocol analysis for detecting malicious IP addresses
An internet protocol (IP) address is the foundation of the Internet, allowing connectivity between people, servers, Internet of Things, and services across the globe. Knowing what is connecting to what and where connections are initiated is crucial to accurately assess a company’s or individual’s se...
Autores principales: | Huang, Yonghong, Negrete, Joanna, Wagener, John, Fralick, Celeste, Rodriguez, Armando, Peterson, Eric, Wosotowsky, Adam |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9471032/ https://www.ncbi.nlm.nih.gov/pubmed/36120119 http://dx.doi.org/10.1007/s40747-022-00838-y |
Ejemplares similares
-
Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network
por: Liu, Zhicheng, et al.
Publicado: (2020) -
MVDroid: an android malicious VPN detector using neural networks
por: Seraj, Saeed, et al.
Publicado: (2023) -
A Novel Hadoop Security Model for Addressing Malicious Collusive Workers
por: Sauber, Amr M., et al.
Publicado: (2021) -
Malicious cryptography: exposing cryptovirology
por: Young, Adam, et al.
Publicado: (2004) -
Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis
por: Gao, Minghui, et al.
Publicado: (2020)