Data-Driven Intelligence can Revolutionize Today’s Cybersecurity World: A Position Paper Authors: Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, Seyit Camtepe | Published: 2023-08-09 AI ComplianceAutomation of CybersecurityData Management System 2023.08.09 2025.05.28 Literature Database
Machine-learned Adversarial Attacks against Fault Prediction Systems in Smart Electrical Grids Authors: Carmelo Ardito, Yashar Deldjoo, Tommaso Di Noia, Eugenio Di Sciascio, Fatemeh Nazary, Giovanni Servedio | Published: 2023-03-28 | Updated: 2024-01-30 Automation of CybersecurityAdversarial ExampleMachine Learning Technology 2023.03.28 2025.05.28 Literature Database
Machine Learning and Port Scans: A Systematic Review Authors: Jason M. Pittman | Published: 2023-01-31 Automation of CybersecurityData CollectionVulnerability detection 2023.01.31 2025.05.28 Literature Database
Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence Authors: Elijah Pelofske, Lorie M. Liebrock, Vincent Urias | Published: 2023-01-27 | Updated: 2024-10-07 Automation of CybersecurityInformation Gathering MethodsVulnerability Management 2023.01.27 2025.05.28 Literature Database
Color Teams for Machine Learning Development Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-10-20 Automation of CybersecurityData CollectionMachine Learning Framework 2021.10.20 2025.05.28 Literature Database
A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods Authors: Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya | Published: 2021-10-15 Automation of CybersecurityMachine Learning AlgorithmAutomated Vulnerability Remediation 2021.10.15 2025.05.28 Literature Database
Leveraging Sharing Communities to Achieve Federated Learning for Cybersecurity Authors: Frank W. Bentrem, Michael A. Corsello, Joshua J. Palm | Published: 2021-04-23 | Updated: 2021-04-27 Automation of CybersecurityModel DesignMachine Learning Technology 2021.04.23 2025.05.28 Literature Database
Application Inference using Machine Learning based Side Channel Analysis Authors: Nikhil Chawla, Arvind Singh, Monodeep Kar, Saibal Mukhopadhyay | Published: 2019-07-09 Automation of CybersecurityData Extraction and AnalysisMachine Learning Framework 2019.07.09 2025.05.28 Literature Database
Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification Authors: Ba Dung Le, Guanhua Wang, Mehwish Nasim, Ali Babar | Published: 2019-07-03 | Updated: 2019-09-05 Automation of CybersecurityData Extraction and AnalysisInformation Gathering Methods 2019.07.03 2025.05.28 Literature Database
Deep Reinforcement Learning for Cyber Security Authors: Thanh Thi Nguyen, Vijay Janapa Reddi | Published: 2019-06-13 | Updated: 2021-11-02 Automation of CybersecurityDeep Reinforcement LearningDefense Method 2019.06.13 2025.05.28 Literature Database