Cyber Threat

Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection

Authors: Qian Chen, Sheikh Rabiul Islam, Henry Haswell, Robert A. Bridges | Published: 2019-10-15
Cyber Threat
Ransomware Assessment
Feature Selection Method

Using Lexical Features for Malicious URL Detection — A Machine Learning Approach

Authors: Apoorva Joshi, Levi Lloyd, Paul Westin, Srini Seethapathy | Published: 2019-10-14
Cyber Threat
Malicious Website Detection
Machine Learning Algorithm

Using AI/ML to gain situational understanding from passive network observations

Authors: D. Verma, S. Calo | Published: 2019-10-14
Cyber Threat
System Observability
Data Collection

False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics

Authors: Gautam Raj Mode, Prasad Calyam, Khaza Anuarul Hoque | Published: 2019-10-03 | Updated: 2019-12-13
Cyber Threat
Attack Evaluation
Machine Learning Algorithm

Machine-Learning Techniques for Detecting Attacks in SDN

Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut | Published: 2019-10-02
Cyber Threat
Attack Evaluation
Machine Learning Algorithm

HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems

Authors: AKM Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac | Published: 2019-09-23
Cyber Threat
Data Collection
Machine Learning Application

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Authors: Adam James Hall, Nikolaos Pitropakis, William J Buchanan, Naghmeh Moradpoor | Published: 2019-07-24
Cyber Threat
User Behavior Analysis
Malicious Prompt

CAMLPAD: Cybersecurity Autonomous Machine Learning Platform for Anomaly Detection

Authors: Ayush Hariharan, Ankit Gupta, Trisha Pal | Published: 2019-07-23
ML-Based IDS
Cyber Threat
Data Contamination Detection

Defending Against Neural Fake News

Authors: Rowan Zellers, Ari Holtzman, Hannah Rashkin, Yonatan Bisk, Ali Farhadi, Franziska Roesner, Yejin Choi | Published: 2019-05-29 | Updated: 2020-12-11
Identification of AI Output
Cyber Threat
Deep Learning Method

Deep-Net: Deep Neural Network for Cyber Security Use Cases

Authors: Vinayakumar R, Barathi Ganesh HB, Prabaharan Poornachandran, Anand Kumar M, Soman KP | Published: 2018-12-09
Cyber Threat
Malware Detection
Deep Learning-Based IDS