Confidential Computing across Edge-to-Cloud for Machine Learning: A Survey Study Authors: SM Zobaed, Mohsen Amini Salehi | Published: 2023-07-31 TEE ImplementationSoftware SecurityData Management System 2023.07.31 2025.05.28 Literature Database
Survey of Malware Analysis through Control Flow Graph using Machine Learning Authors: Shaswata Mitra, Stephen A. Torri, Sudip Mittal | Published: 2023-05-15 | Updated: 2023-06-20 Graph Neural NetworkSoftware SecurityStatic Analysis 2023.05.15 2025.05.28 Literature Database
Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity Authors: Khatoon Mohammed | Published: 2023-02-24 | Updated: 2024-03-02 WatermarkingSoftware SecurityVulnerability Analysis 2023.02.24 2025.05.28 Literature Database
Beware of the Unexpected: Bimodal Taint Analysis Authors: Yiu Wai Chow, Max Schäfer, Michael Pradel | Published: 2023-01-25 Software SecurityProgram AnalysisVulnerability Management 2023.01.25 2025.05.28 Literature Database
Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection Authors: Benjamin Steenhoek, Hongyang Gao, Wei Le | Published: 2022-12-15 | Updated: 2023-10-01 Software SecurityData Flow AnalysisProgram Analysis 2022.12.15 2025.05.28 Literature Database
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic | Published: 2022-12-07 | Updated: 2023-04-13 Security AssuranceSoftware SecurityEvaluation Method 2022.12.07 2025.05.28 Literature Database
Multi-feature Dataset for Windows PE Malware Classification Authors: Muhammad Irfan Yousuf, Izza Anwer, Tanzeela Shakir, Minahil Siddiqui, Maysoon Shahid | Published: 2022-10-28 Software SecurityChallenges of Data LabelingClassification of Malicious Actors 2022.10.28 2025.05.28 Literature Database
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák | Published: 2022-06-29 Cyber ThreatSoftware SecurityVulnerability Management 2022.06.29 2025.05.28 Literature Database
GANG-MAM: GAN based enGine for Modifying Android Malware Authors: Renjith G, Sonia Laudanna, Aji S, Corrado Aaron Visaggio, Vinod P | Published: 2021-09-27 Software SecurityMalware Detection MethodAdversarial attack 2021.09.27 2025.05.28 Literature Database
POSSE: Patterns of Systems During Software Encryption Authors: David Noever, Samantha Miller Noever | Published: 2021-09-24 Software SecurityPerformance EvaluationMachine Learning Application 2021.09.24 2025.05.28 Literature Database