Code Defect Detection Model with Multi-layer Bi-directional Long Short Term Memory based on Self-Attention Mechanism
Abstract
References
Index Terms
- Code Defect Detection Model with Multi-layer Bi-directional Long Short Term Memory based on Self-Attention Mechanism
Recommendations
Insider Threat Detection with Long Short-Term Memory
ACSW '19: Proceedings of the Australasian Computer Science Week MulticonferenceMost organizations these days are increasingly threatened by malicious insiders. The traditional cybersecurity system uses historical logs to investigate/prevent attacks from outside a company. However, for insider threats, new models and techniques are ...
A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment
AbstractThe fact that cloud systems are under the increasing risks of cyber attacks has made the phenomenon of information security first a need and then a necessity for these systems. Distributed Denial of Service (DDoS) attacks can exploit, ...
Real-time anomaly detection based on long short-Term memory and Gaussian Mixture Model
AbstractAnomaly detection is a long-standing problem in system designation. High-quality anomaly detection can benefit plenty of applications (e.g. system monitoring, disaster precaution and intrusion detection). Most of the existing anomalies ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 17Total Downloads
- Downloads (Last 12 months)17
- Downloads (Last 6 weeks)4
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format