2022
DOI: 10.1155/2022/4199044
|View full text |Cite|
|
Sign up to set email alerts
|

Learning Representations Using RNN Encoder-Decoder for Edge Security Control

Abstract: Whitelisting is a widely used method in the security field. However, due to the rapid development of the Internet, the traditional whitelisting method cannot promote the security of increasing Internet access. In recent years, with the success of machine learning in different areas, many researchers focus on the security of Internet access through machine learning methods. The most common form of machine learning is supervised learning. Supervised learning requires a large number of labeled samples, but it is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 23 publications
0
1
0
Order By: Relevance
“…Knowledge-based security technologies formally define entities, such as attack types, vulnerabilities, and attackers, and their relationships. Consequently, the system can gain a deeper understanding of security events and quickly identify the overall scenario or pattern of an attack by linking various elements of threat information [4]. By understanding the knowledge of specific security threats and the attack situation, accurate and effective response strategies can be established.…”
Section: Introductionmentioning
confidence: 99%
“…Knowledge-based security technologies formally define entities, such as attack types, vulnerabilities, and attackers, and their relationships. Consequently, the system can gain a deeper understanding of security events and quickly identify the overall scenario or pattern of an attack by linking various elements of threat information [4]. By understanding the knowledge of specific security threats and the attack situation, accurate and effective response strategies can be established.…”
Section: Introductionmentioning
confidence: 99%
“…Tis article has been retracted by Hindawi, as publisher, following an investigation undertaken by the publisher [1]. Tis investigation has uncovered evidence of systematic manipulation of the publication and peer-review process.…”
mentioning
confidence: 99%