Literature Database

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17
Dataset evaluation
Intrusion Detection System
Taxonomy of Attacks

Machine Learning for Detecting Data Exfiltration: A Review

Authors: Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire | Published: 2020-12-17 | Updated: 2021-03-21
Dataset evaluation
Attack Detection
Role of Machine Learning

Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach

Authors: MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami | Published: 2020-12-16
ML-Based IDS
Machine Learning Application
Complexity of the Environment

Optimized Random Forest Model for Botnet Detection Based on DNS Queries

Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami | Published: 2020-12-16
DDoS Attack
Machine Learning Application
Defense Method

An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center

Authors: Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles, Dan Scofield | Published: 2020-12-16
User Behavior Analysis
Attack Detection
Role of Machine Learning

Exacerbating Algorithmic Bias through Fairness Attacks

Authors: Ninareh Mehrabi, Muhammad Naveed, Fred Morstatter, Aram Galstyan | Published: 2020-12-16
Taxonomy of Attacks
Adversarial Attack Methods
Role of Machine Learning

FoggySight: A Scheme for Facial Lookup Privacy

Authors: Ivan Evtimov, Pascal Sturmfels, Tadayoshi Kohno | Published: 2020-12-15
Data Privacy Assessment
Adversarial Example
Face Recognition

Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach

Authors: Noah Oghenfego Ogwara, Krassie Petrova, Mee Loong, Yang, Stephen G. MacDonell | Published: 2020-12-15
Cloud Computing
Intrusion Detection System
Role of Machine Learning

Differentiation of Sliding Rescaled Ranges: New Approach to Encrypted and VPN Traffic Detection

Authors: Raoul Nigmatullin, Alexander Ivchenko, Semyon Dorokhin | Published: 2020-12-14
Data Flow Analysis
Time-Related Features
Role of Machine Learning

Leaking Sensitive Financial Accounting Data in Plain Sight using Deep Autoencoder Neural Networks

Authors: Marco Schreyer, Chistian Schulze, Damian Borth | Published: 2020-12-13
Data Protection Method
Image Feature Extraction
Financial Intelligence