J Wang, H Jin, J Chen, J Tan, K Zhong - Information Sciences, 2022 - Elsevier
IoMT technology has many advantages in healthcare system, such as optimizing the medical service model, improving the efficiency of hospital operation and management, and …
Traffic safety field has been oriented toward finding the relationships between crash outcomes and predictor variables to understand crash phenomena and/or predict future …
T Takahashi, Y Umemura, C Han, T Ban… - … and other Affiliated …, 2021 - ieeexplore.ieee.org
To cope with growing cyber threats on the Internet, various techniques have been proposed and implemented. Each of these techniques automates specific tasks of cybersecurity …
As cyberattacks become increasingly prevalent globally, there is a need to identify trends in these cyberattacks and take suitable countermeasures quickly. The darknet, an unused IP …
Malware is increasingly diversified and sophisti-cated. It is essential to rapidly and accurately detect malware activities when malware infection spreads. However, accurately …
YW Chang, HY Chen, C Han… - … on Emerging Topics …, 2023 - ieeexplore.ieee.org
5G networks with the vast number of devices pose security threats. Manual analysis of such extensive security data is complex. Dark-NMF can detect malware activities by monitoring …
A Tanaka, C Han, T Takahashi… - 2021 Sixth International …, 2021 - ieeexplore.ieee.org
Identifying individual scan activities is a crucial and challenging activity for mitigating emerging cyber threats or gaining insights into security scans. Sophisticated adversaries …
X Tan, Y Shen, M Wang, B Wang - Proceedings of the 32nd ACM …, 2023 - dl.acm.org
Graph knowledge discovery from graph-structured data is a fascinating data mining topic in various domains, especially in the Internet of Things, where inferring the graph structure …
C Han, A Tanaka, T Takahashi - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Most packets arriving in the darknet (or network telescope), which is unused IP address space on the Internet, are related to indiscriminate scanning and attack activities. In recent …