All Stories

  1. Quantitatively Assessing the Cyber-to-Physical Risk of Industrial Cyber-Physical Systems
  2. Mobile terminal identity authentication system based on behavioral characteristics
  3. Adversarial Seeded Sequence Growing for Weakly-Supervised Temporal Action Localization
  4. CCID: Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS
  5. Web Phishing Detection Using a Deep Learning Framework
  6. Detecting malware based on expired command-and-control traffic