On the Role of Similarity in Detecting Masquerading Files Authors: Jonathan Oliver, Jue Mo, Susmit Yenkar, Raghav Batta, Sekhar Josyoula | Published: 2024-02-17 CybersecurityIntegration of Digital Signatures and Machine LearningMalware Classification 2024.02.17 2025.05.27 Literature Database
ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System Authors: Tommaso Puccetti, Simone Nardi, Cosimo Cinquilli, Tommaso Zoppi, Andrea Ceccarelli | Published: 2024-02-13 CybersecurityData CollectionIntrusion Detection System 2024.02.13 2025.05.27 Literature Database
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge Authors: Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Tamas Bisztray, Merouane Debbah | Published: 2024-02-12 | Updated: 2024-06-03 LLM Performance EvaluationCybersecurityDataset Generation 2024.02.12 2025.05.27 Literature Database
A Review and Comparison of AI Enhanced Side Channel Analysis Authors: Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin | Published: 2024-02-03 WatermarkingCybersecurityDeep Learning Method 2024.02.03 2025.05.27 Literature Database
algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms Authors: Naresh Kshetri, Dilip Kumar, James Hutson, Navneet Kaur, Omar Faruq Osama | Published: 2024-02-01 AlgorithmWebsite VulnerabilityCybersecurity 2024.02.01 2025.05.27 Literature Database
Ransomware threat mitigation through network traffic analysis and machine learning techniques Authors: Ali Mehrban, Shirin Karimi Geransayeh | Published: 2024-01-27 | Updated: 2024-02-04 CybersecurityRansomware AssessmentMachine Learning Method 2024.01.27 2025.05.27 Literature Database
Evaluation of LLM Chatbots for OSINT-based Cyber Threat Awareness Authors: Samaneh Shafee, Alysson Bessani, Pedro M. Ferreira | Published: 2024-01-26 | Updated: 2024-04-19 LLM Performance EvaluationCybersecurityPrompt Injection 2024.01.26 2025.05.27 Literature Database
Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation Authors: Mirza Akhi Khatun, Sanober Farheen Memon, Ciarán Eising, Lubna Luxmi Dhirani | Published: 2024-01-17 DDoS AttackCybersecurityAdvancements in Medical IoT 2024.01.17 2025.05.27 Literature Database
A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation Authors: Zag ElSayed, Nelly Elsayed, Sajjad Bay | Published: 2024-01-14 CybersecuritySecurity AnalysisAdvancements in Medical IoT 2024.01.14 2025.05.27 Literature Database
Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy | Published: 2024-01-12 CybersecuritySecurity AnalysisPhysical layer security 2024.01.12 2025.05.27 Literature Database