Picture for Bogdan Ghita

Bogdan Ghita

Audio Interval Retrieval using Convolutional Neural Networks

Add code
Sep 21, 2021
Figure 1 for Audio Interval Retrieval using Convolutional Neural Networks
Figure 2 for Audio Interval Retrieval using Convolutional Neural Networks
Figure 3 for Audio Interval Retrieval using Convolutional Neural Networks
Figure 4 for Audio Interval Retrieval using Convolutional Neural Networks
Viaarxiv icon

A Novel Online Incremental Learning Intrusion Prevention System

Add code
Sep 20, 2021
Figure 1 for A Novel Online Incremental Learning Intrusion Prevention System
Figure 2 for A Novel Online Incremental Learning Intrusion Prevention System
Figure 3 for A Novel Online Incremental Learning Intrusion Prevention System
Figure 4 for A Novel Online Incremental Learning Intrusion Prevention System
Viaarxiv icon

Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation

Add code
Sep 08, 2021
Figure 1 for Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation
Figure 2 for Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation
Figure 3 for Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation
Figure 4 for Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation
Viaarxiv icon

Detection of Insider Threats using Artificial Intelligence and Visualisation

Add code
Sep 06, 2021
Figure 1 for Detection of Insider Threats using Artificial Intelligence and Visualisation
Figure 2 for Detection of Insider Threats using Artificial Intelligence and Visualisation
Figure 3 for Detection of Insider Threats using Artificial Intelligence and Visualisation
Figure 4 for Detection of Insider Threats using Artificial Intelligence and Visualisation
Viaarxiv icon

Detection of LDDoS Attacks Based on TCP Connection Parameters

Add code
Mar 12, 2019
Figure 1 for Detection of LDDoS Attacks Based on TCP Connection Parameters
Figure 2 for Detection of LDDoS Attacks Based on TCP Connection Parameters
Figure 3 for Detection of LDDoS Attacks Based on TCP Connection Parameters
Figure 4 for Detection of LDDoS Attacks Based on TCP Connection Parameters
Viaarxiv icon