|
1
|
Applying transformer architecture to enhance attack detection performance in intrusion detection systemsIntrusion Detection Systems (IDS) are crucial in safeguarding network security against increasingly sophisticated threats. In this study, we propose a Transformer-based intrusion detection model to... Author: Vu Phuong Thi, Ha Hoang Thi Hong, Truong Dinh Gia, Yen Tran Thi Keyword: Intrusion Detection Transformer UNSW-NB15 Cybersecurity Self-attention
|
|
2
|
Developing a competency framework for learners - an effective solution for contemporary political theory training at the intermediate levelThe article argues that, amid innovation, international integration, and digital transformation, enhancing the quality of grassroots officials requires Intermediate Political Theory training to... Author: Long Tran Ba, Thanh Thanh Duong Thi Keyword: Competency framework political theory training competency-based approach.
|
|
3
|
Applying the Autoencoder model for URL phishing detectionIn the era of digital transformation, alongside the rapid devel-opment of the Internet and online applications, phishing at-tacks targeting users through malicious URLs have been in-creasingly... Author: Mai Dang Thi Keyword: URL Phishing detection Autoencoder latent space
|
|
4
|
An investigation into lexical con-tents in English standardized testsThis paper aims to critically analyze lexical contents in national English standardized tests in an EFL context. Using the Compleat Lexical Tutor corpus tool, the lexical profiles of these exams are... Author: Dinh Thi Mai Anh, Tran Tien Ba Keyword: Vocabulary lexical profile word types test examination
|
|
5
|
Test DHV ENTest DHV EN Author: Hieu Do Trong Keyword: Test DHV EN
|