Although using machine learning techniques to solve computer security challenges is not a new idea,the rapidly emerging Deep Learning technology has recently tr
Command and control (C2) servers are used by attackers to operate communications.To perform attacks,attackers usually employee the Domain Generation Algorithm (
Unikel,specializing a minimalistic libOS with an application,is an attractive design for cloud computing.However,the Achilles’ heel of unikel is the lack of mu
The National Institute of Standards and Technology (NIST) has identified natural language policies as the preferred expression of policy and implicitly called f
The popularity of social networking sites has attracted billions of users to engage and share their information on these networks.The vast amount of circulating