Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey Authors: Syeda Manjia Tahsien, Hadis Karimipour, Petros Spachos | Published: 2020-04-11 Security AnalysisAttack EvaluationAttack Detection 2020.04.11 2025.05.28 Literature Database
Challenges in Forecasting Malicious Events from Incomplete Data Authors: Nazgol Tavabi, Andrés Abeliuk, Negar Mokhberian, Jeremy Abramson, Kristina Lerman | Published: 2020-04-06 Security AnalysisDataset evaluationVulnerability Assessment Method 2020.04.06 2025.05.28 Literature Database
An Autonomous Intrusion Detection System Using an Ensemble of Advanced Learners Authors: Amir Andalib, Vahid Tabataba Vakili | Published: 2020-01-31 | Updated: 2020-12-29 Security AnalysisMachine Learning TechnologyFeature Extraction Method 2020.01.31 2025.05.28 Literature Database
IoT Behavioral Monitoring via Network Traffic Analysis Authors: Arunan Sivanathan | Published: 2020-01-28 IoT Traffic CharacteristicsSecurity AnalysisDevice Identification Method 2020.01.28 2025.05.28 Literature Database
Detecting Network Anomalies using Rule-based machine learning within SNMP-MIB dataset Authors: Abdalrahman Hwoij, Mouhammd Al-kasassbeh, Mustafa Al-Fayoumi | Published: 2020-01-18 DDoS Attack DetectionSecurity AnalysisMachine Learning Technology 2020.01.18 2025.05.28 Literature Database
Machine Learning in Network Security Using KNIME Analytics Authors: Munther Abualkibash | Published: 2019-11-18 Security AnalysisData-Driven ClusteringMachine Learning Technology 2019.11.18 2025.05.28 Literature Database
Machine Learning based IoT Edge Node Security Attack and Countermeasures Authors: Vishalini R. Laguduva, Sheikh Ariful Islam, Sathyanarayanan Aakur, Srinivas Katkoori, Robert Karam | Published: 2019-09-17 Cyber AttackSecurity AnalysisMachine Learning Method 2019.09.17 2025.05.28 Literature Database
A Convolutional Transformation Network for Malware Classification Authors: Duc-Ly Vu, Trong-Kha Nguyen, Tam V. Nguyen, Tu N. Nguyen, Fabio Massacci, Phu H. Phung | Published: 2019-09-16 Security AnalysisClassification of Malicious ActorsMachine Learning Method 2019.09.16 2025.05.28 Literature Database
White-Box Adversarial Defense via Self-Supervised Data Estimation Authors: Zudi Lin, Hanspeter Pfister, Ziming Zhang | Published: 2019-09-13 Security AnalysisPerformance EvaluationAdversarial Learning 2019.09.13 2025.05.28 Literature Database
An Empirical Investigation of Randomized Defenses against Adversarial Attacks Authors: Yannik Potdevin, Dirk Nowotka, Vijay Ganesh | Published: 2019-09-12 Security AnalysisAdversarial ExampleMachine Learning Technology 2019.09.12 2025.05.28 Literature Database