Honeypot Method to Lure Attackers Without Holding Crypto-Assets.
Hironori UchiboriKatsunari YoshiokaKazumasa OmotePublished in: IEEE Access (2024)
Keyphrases
- high accuracy
- detection method
- high precision
- fully automatic
- synthetic data
- classification accuracy
- similarity measure
- computational complexity
- training set
- cost function
- experimental evaluation
- main contribution
- computational cost
- evaluation method
- optimization method
- optimization algorithm
- segmentation algorithm
- neural network
- significant improvement
- prior knowledge
- multiresolution
- pairwise
- image sequences
- learning algorithm