Literature Database

Identifying botnet IP address clusters using natural language processing techniques on honeypot command logs

Authors: Valentino Crespi, Wes Hardaker, Sami Abu-El-Haija, Aram Galstyan | Published: 2021-04-20
Command Analysis
User Activity Analysis
Time-Related Features

On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware

Authors: Molly Buchanan, Jeffrey W. Collyer, Jack W. Davidson, Saikat Dey, Mark Gardner, Jason D. Hiser, Jeffry Lang, Alastair Nottingham, Alina Oprea | Published: 2021-04-20 | Updated: 2022-05-27
ML-Based IDS
Cyber Attack
Data Management System

Voting Classifier-based Intrusion Detection for IoT Networks

Authors: Muhammad Almas Khan, Muazzam A Khan, Shahid Latif, Awais Aziz Shah, Mujeeb Ur Rehman, Wadii Boulila, Maha Driss, Jawad Ahmad | Published: 2021-04-20 | Updated: 2021-04-25
ML-Based IDS
Multi-Class Classification
Machine Learning Technology

Adversarial Training for Deep Learning-based Intrusion Detection Systems

Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees | Published: 2021-04-20
ML-Based IDS
Backdoor Attack
Adversarial Example

Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks

Authors: Simon Mandlik, Tomas Pevny | Published: 2021-04-19 | Updated: 2022-06-08
Poisoning
Model Design
Machine Learning Technology

Vectorized Secure Evaluation of Decision Forests

Authors: Raghav Malik, Vidush Singhal, Benjamin Gottfried, Milind Kulkarni | Published: 2021-04-19
Privacy Protection
Model Design
Encryption Technology

Secure Human Action Recognition by Encrypted Neural Network Inference

Authors: Miran Kim, Xiaoqian Jiang, Kristin Lauter, Elkhan Ismayilzada, Shayan Shams | Published: 2021-04-19 | Updated: 2022-08-09
Data Protection Method
Data Management System
Encryption Technology

Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems

Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz | Published: 2021-04-18 | Updated: 2022-06-19
Adversarial Example
Adversarial Example Detection
Defense Mechanism

Ponzi Scheme Detection in EthereumTransaction Network

Authors: Shanqing Yu, Jie Jin, Yunyi Xie, Jie Shen, Qi Xuan | Published: 2021-04-17
Data Preprocessing
Blockchain Economics
Crime Detection

Orthogonalizing Convolutional Layers with the Cayley Transform

Authors: Asher Trockman, J. Zico Kolter | Published: 2021-04-14
Model Design
Resource optimization
Machine Learning Technology