Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection Authors: Qian Chen, Sheikh Rabiul Islam, Henry Haswell, Robert A. Bridges | Published: 2019-10-15 Cyber ThreatRansomware AssessmentFeature Selection Method 2019.10.15 2025.05.28 Literature Database
Using Lexical Features for Malicious URL Detection — A Machine Learning Approach Authors: Apoorva Joshi, Levi Lloyd, Paul Westin, Srini Seethapathy | Published: 2019-10-14 Cyber ThreatMalicious Website DetectionMachine Learning Algorithm 2019.10.14 2025.05.28 Literature Database
Using AI/ML to gain situational understanding from passive network observations Authors: D. Verma, S. Calo | Published: 2019-10-14 Cyber ThreatSystem ObservabilityData Collection 2019.10.14 2025.05.28 Literature Database
False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics Authors: Gautam Raj Mode, Prasad Calyam, Khaza Anuarul Hoque | Published: 2019-10-03 | Updated: 2019-12-13 Cyber ThreatAttack EvaluationMachine Learning Algorithm 2019.10.03 2025.05.28 Literature Database
Machine-Learning Techniques for Detecting Attacks in SDN Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut | Published: 2019-10-02 Cyber ThreatAttack EvaluationMachine Learning Algorithm 2019.10.02 2025.05.28 Literature Database
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems Authors: AKM Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac | Published: 2019-09-23 Cyber ThreatData CollectionMachine Learning Application 2019.09.23 2025.05.28 Literature Database
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier Authors: Adam James Hall, Nikolaos Pitropakis, William J Buchanan, Naghmeh Moradpoor | Published: 2019-07-24 Cyber ThreatUser Behavior AnalysisMalicious Prompt 2019.07.24 2025.05.28 Literature Database
CAMLPAD: Cybersecurity Autonomous Machine Learning Platform for Anomaly Detection Authors: Ayush Hariharan, Ankit Gupta, Trisha Pal | Published: 2019-07-23 ML-Based IDSCyber ThreatData Contamination Detection 2019.07.23 2025.05.28 Literature Database
Defending Against Neural Fake News Authors: Rowan Zellers, Ari Holtzman, Hannah Rashkin, Yonatan Bisk, Ali Farhadi, Franziska Roesner, Yejin Choi | Published: 2019-05-29 | Updated: 2020-12-11 Identification of AI OutputCyber ThreatDeep Learning Method 2019.05.29 2025.05.28 Literature Database
Deep-Net: Deep Neural Network for Cyber Security Use Cases Authors: Vinayakumar R, Barathi Ganesh HB, Prabaharan Poornachandran, Anand Kumar M, Soman KP | Published: 2018-12-09 Cyber ThreatMalware DetectionDeep Learning-Based IDS 2018.12.09 2025.05.28 Literature Database