NUK - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 559
1.
  • Activity Coefficient at Inf... Activity Coefficient at Infinite Dilution Study of Molecular Interaction-Selectivity in Separation Processes
    Li, Cailian; Ban, Tao; Wang, Qiang International journal of thermophysics, 2020/9, Volume: 41, Issue: 9
    Journal Article
    Peer reviewed

    The activity coefficient at infinite dilution for 47 selected organic solutes in 1-allyl-3-methylimidazolium chloride (AMIMCl) ionic liquid (IL) was determined at 303.15 K to 343.15 K through inverse ...
Full text
2.
  • 3-3 Data Mining Applied to ... 3-3 Data Mining Applied to Darknet Traffic Analysis
    Ban, Tao Journal of the National Institute of Information and Communications Technology, 03/2017, Volume: 63, Issue: 2
    Journal Article

    The monitoring of unused IP address space - so called darknet - provides a cost-effective way to monitor the global trends of cyber-attacks in the Internet. By monitoring a large, distributed, ...
Full text
3.
  • Incremental and Decremental... Incremental and Decremental Max-Flow for Online Semi-Supervised Learning
    Lei Zhu; Shaoning Pang; Sarrafzadeh, Abdolhossein ... IEEE transactions on knowledge and data engineering, 2016-Aug.-1, 2016-8-1, 20160801, Volume: 28, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    Max-flow has been adopted for semi-supervised data modelling, yet existing algorithms were derived only for the learning from static data. This paper proposes an online max-flow algorithm for the ...
Full text

PDF
4.
  • A study of IoT malware acti... A study of IoT malware activities using association rule learning for darknet sensor data
    Ozawa, Seiichi; Ban, Tao; Hashimoto, Naoki ... International journal of information security, 02/2020, Volume: 19, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Along with the proliferation of Internet of Things (IoT) devices, cyberattacks towards these devices are on the rise. In this paper, we present a study on applying Association Rule Learning to ...
Full text

PDF
5.
  • Large-scale cyber attacks m... Large-scale cyber attacks monitoring using Evolving Cauchy Possibilistic Clustering
    Škrjanc, Igor; Ozawa, Seiichi; Ban, Tao ... Applied soft computing, January 2018, 2018-01-00, Volume: 62
    Journal Article
    Peer reviewed

    Display omitted •A novel evolving possibilistic Cauchy clustering (eCauchy) is presented that is able to learn a classifier in an online manner on a stream of data.•As oppose to some evolving ...
Full text
6.
  • Breaking Alert Fatigue: AI-... Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response
    Ban, Tao; Takahashi, Takeshi; Ndichu, Samuel ... Applied sciences, 05/2023, Volume: 13, Issue: 11
    Journal Article
    Peer reviewed
    Open access

    Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by ...
Full text
7.
  • AI-Assisted Security Alert ... AI-Assisted Security Alert Data Analysis with Imbalanced Learning Methods
    Ndichu, Samuel; Ban, Tao; Takahashi, Takeshi ... Applied sciences, 02/2023, Volume: 13, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Intrusion analysis is essential for cybersecurity, but oftentimes, the overwhelming number of false alerts issued by security appliances can prove to be a considerable hurdle. Machine learning ...
Full text
8.
  • IoT malware classification ... IoT malware classification based on reinterpreted function-call graphs
    Wu, Chia-Yi; Ban, Tao; Cheng, Shin-Ming ... Computers & security, February 2023, 2023-02-00, Volume: 125
    Journal Article
    Peer reviewed

    Various malware and cyberattacks have arisen along with the proliferation of IoT devices. The evolving malware targeting IoT devices calls forth effective and efficient solutions to protect ...
Full text
9.
  • Metabolomics and Network An... Metabolomics and Network Analyses Reveal Phenylalanine and Tyrosine as Signatures of Anthracycline-Induced Hepatotoxicity
    Liu, Peipei; Wu, Jing; Yu, Xinyue ... Pharmaceuticals, 05/2023, Volume: 16, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    The chemotherapy drug doxorubicin (DOX) is an anthracycline with over 30% incidence of liver injury in breast cancer patients, yet the mechanism of its hepatotoxicity remains unclear. To identify ...
Full text
10.
  • Threat Alert Prioritization... Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis
    Aminanto, Muhamad Erza; Ban, Tao; Isawa, Ryoichi ... IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    Security Incident and Event Manager (SIEM) is a security management approach designed to identify possible threats within a real-time enterprise environment. The main challenge for SIEM is to find ...
Full text

PDF
1 2 3 4 5
hits: 559

Load filters