Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17 Dataset evaluationIntrusion Detection SystemTaxonomy of Attacks 2020.12.17 2025.05.28 Literature Database
Machine Learning for Detecting Data Exfiltration: A Review Authors: Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire | Published: 2020-12-17 | Updated: 2021-03-21 Dataset evaluationAttack DetectionRole of Machine Learning 2020.12.17 2025.05.28 Literature Database
Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach Authors: MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami | Published: 2020-12-16 ML-Based IDSMachine Learning ApplicationComplexity of the Environment 2020.12.16 2025.05.28 Literature Database
Optimized Random Forest Model for Botnet Detection Based on DNS Queries Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami | Published: 2020-12-16 DDoS AttackMachine Learning ApplicationDefense Method 2020.12.16 2025.05.28 Literature Database
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center Authors: Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles, Dan Scofield | Published: 2020-12-16 User Behavior AnalysisAttack DetectionRole of Machine Learning 2020.12.16 2025.05.28 Literature Database
Exacerbating Algorithmic Bias through Fairness Attacks Authors: Ninareh Mehrabi, Muhammad Naveed, Fred Morstatter, Aram Galstyan | Published: 2020-12-16 Taxonomy of AttacksAdversarial Attack MethodsRole of Machine Learning 2020.12.16 2025.05.28 Literature Database
FoggySight: A Scheme for Facial Lookup Privacy Authors: Ivan Evtimov, Pascal Sturmfels, Tadayoshi Kohno | Published: 2020-12-15 Data Privacy AssessmentAdversarial ExampleFace Recognition 2020.12.15 2025.05.28 Literature Database
Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach Authors: Noah Oghenfego Ogwara, Krassie Petrova, Mee Loong, Yang, Stephen G. MacDonell | Published: 2020-12-15 Cloud ComputingIntrusion Detection SystemRole of Machine Learning 2020.12.15 2025.05.28 Literature Database
Differentiation of Sliding Rescaled Ranges: New Approach to Encrypted and VPN Traffic Detection Authors: Raoul Nigmatullin, Alexander Ivchenko, Semyon Dorokhin | Published: 2020-12-14 Data Flow AnalysisTime-Related FeaturesRole of Machine Learning 2020.12.14 2025.05.28 Literature Database
Leaking Sensitive Financial Accounting Data in Plain Sight using Deep Autoencoder Neural Networks Authors: Marco Schreyer, Chistian Schulze, Damian Borth | Published: 2020-12-13 Data Protection MethodImage Feature ExtractionFinancial Intelligence 2020.12.13 2025.05.28 Literature Database