Literature Database

Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing

Authors: Opeyemi Osanaiye, Kim-Kwang Raymond Choo2, Ali Dehghantanha, Zheng Xu, Mqhele Dlodlo | Published: 2018-07-27
Model Evaluation
Machine Learning Application
Feature Selection Method

Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware

Authors: James Baldwin, Ali Dehghantanha | Published: 2018-07-27
Training Protocol
Model Evaluation
Feature Selection Method

Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection

Authors: Omar M. K. Alhawi, James Baldwin, Ali Dehghantanha | Published: 2018-07-27
Backdoor Detection
Model Evaluation
Machine Learning Application

Limitations of the Lipschitz constant as a defense against adversarial examples

Authors: Todd Huster, Cho-Yu Jason Chiang, Ritu Chadha | Published: 2018-07-25
Model Evaluation
Robustness Evaluation
Adversarial Example

Architectures for Detecting Interleaved Multi-stage Network Attacks Using Hidden Markov Models

Authors: Tawfeeq Shawly, Ali Elghariani, Jason Kobes, Arif Ghafoor | Published: 2018-07-25 | Updated: 2019-10-30
Markov Model
Attack Scenario Analysis
State Transition Model

Supervised and Semi-Supervised Deep Neural Networks for CSI-Based Authentication

Authors: Qian Wang, Hang Li, Zhi Chen, Dou Zhao, Shuang Ye, Jiansheng Cai | Published: 2018-07-25
Model Design and Accuracy
Differential Privacy
Feature Extraction Method

2P-DNN : Privacy-Preserving Deep Neural Networks Based on Homomorphic Cryptosystem

Authors: Qiang Zhu, Xixiang Lv | Published: 2018-07-23
Trigger Detection
Privacy Assessment
Model Design and Accuracy

MOBA-Slice: A Time Slice Based Evaluation Framework of Relative Advantage between Teams in MOBA Games

Authors: Lijun Yu, Dawei Zhang, Xiangqun Chen, Xing Xie | Published: 2018-07-22
Game Theory
Model Design and Accuracy
Model Evaluation

A Preliminary Study On the Sustainability of Android Malware Detection

Authors: Haipeng Cai | Published: 2018-07-22 | Updated: 2018-08-03
Malware Detection
Model Evaluation
Behavior Analysis Method

Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection

Authors: Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid | Published: 2018-07-22
Model Evaluation
Early Detection Method
Feature Selection Method