5G Network Slicing: Analysis of Multiple Machine Learning Classifiers Authors: Mirsad Malkoc, Hisham A. Kholidy | Published: 2023-10-03 Security AnalysisNetwork SlicingMachine Learning Method 2023.10.03 2025.05.28 Literature Database
Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives Authors: Sihao Hu, Tiansheng Huang, Fatih İlhan, Selim Furkan Tekin, Ling Liu | Published: 2023-10-02 | Updated: 2023-10-16 Security AnalysisPrompt InjectionVulnerability Prediction 2023.10.02 2025.05.28 Literature Database
Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection Authors: Bibek Bhattarai, H. Howie Huang | Published: 2023-10-02 WatermarkingSecurity AnalysisThreat modeling 2023.10.02 2025.05.28 Literature Database
LLM Censorship: A Machine Learning Challenge or a Computer Security Problem? Authors: David Glukhov, Ilia Shumailov, Yarin Gal, Nicolas Papernot, Vardan Papyan | Published: 2023-07-20 Security AnalysisProgram VerificationAttack Method 2023.07.20 2025.05.28 Literature Database
Hidden Markov Models with Random Restarts vs Boosting for Malware Detection Authors: Aditya Raghavan, Fabio Di Troia, Mark Stamp | Published: 2023-07-17 AUC EvaluationSecurity AnalysisMalware Detection with Limited Samples 2023.07.17 2025.05.28 Literature Database
Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering Authors: Valdemar Švábenský, Jan Vykopal, Pavel Čeleda, Kristián Tkáčik, Daniel Popovič | Published: 2023-07-13 Security AnalysisDataset GenerationEducational Data Mining 2023.07.13 2025.05.28 Literature Database
Is there a Trojan! : Literature survey and critical evaluation of the latest ML based modern intrusion detection systems in IoT environments Authors: Vishal Karanam | Published: 2023-06-14 Security AnalysisModel Performance EvaluationMachine Learning Technology 2023.06.14 2025.05.28 Literature Database
Measuring and Modeling the Free Content Web Authors: Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, and David Mohaisen | Published: 2023-04-26 Website VulnerabilitySecurity AnalysisVulnerability Analysis 2023.04.26 2025.05.28 Literature Database
A Security Verification Framework of Cryptographic Protocols Using Machine Learning Authors: Kentaro Ohno, Misato Nakabayashi | Published: 2023-04-26 Security AnalysisTraining ProtocolPrototype Network 2023.04.26 2025.05.28 Literature Database
SQLi Detection with ML: A data-source perspective Authors: Balazs Pejo, Nikolett Kapui | Published: 2023-04-24 Website VulnerabilitySecurity AnalysisIntrusion Detection System 2023.04.24 2025.05.28 Literature Database