Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques Authors: Surasit Songma, Watcharakorn Netharn, Siriluck Lorpunmanee | Published: 2024-08-14 CybersecurityData PreprocessingModel Performance Evaluation 2024.08.14 2025.05.27 Literature Database
Diffusion-based Adversarial Purification for Intrusion Detection Authors: Mohamed Amine Merzouk, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens | Published: 2024-06-25 Data PreprocessingAdversarial TrainingAutomated Intrusion Detection System 2024.06.25 2025.05.27 Literature Database
Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez | Published: 2024-05-15 LLM Performance EvaluationData PreprocessingMalware Classification 2024.05.15 2025.05.27 Literature Database
A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection Authors: Raja Giryes, Lior Shafir, Avishai Wool | Published: 2024-05-12 DDoS Attack DetectionData PreprocessingEvaluation Method 2024.05.12 2025.05.27 Literature Database
Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums Authors: Felipe Moreno-Vera | Published: 2024-05-07 CybersecurityData PreprocessingVulnerability Management 2024.05.07 2025.05.27 Literature Database
Distributed Federated Learning-Based Deep Learning Model for Privacy MRI Brain Tumor Detection Authors: Lisang Zhou, Meng Wang, Ning Zhou | Published: 2024-04-15 Data PreprocessingPrivacy ProtectionThreats of Medical AI 2024.04.15 2025.05.27 Literature Database
Contextual Chart Generation for Cyber Deception Authors: David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba | Published: 2024-04-07 Data PreprocessingModel DesignEvaluation Method 2024.04.07 2025.05.27 Literature Database
Federated Learning on Transcriptomic Data: Model Quality and Performance Trade-Offs Authors: Anika Hannemann, Jan Ewald, Leo Seeger, Erik Buchmann | Published: 2024-02-22 Data Privacy AssessmentData PreprocessingFederated Learning 2024.02.22 2025.05.27 Literature Database
MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek in WSNs Authors: Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul Islam, Sunil Aryal | Published: 2024-02-17 | Updated: 2024-02-22 Data PreprocessingModel Performance EvaluationIntrusion Detection System 2024.02.17 2025.05.27 Literature Database
Segmentation-free Connectionist Temporal Classification loss based OCR Model for Text Captcha Classification Authors: Vaibhav Khatavkar, Makarand Velankar, Sneha Petkar | Published: 2024-02-08 CAPTCHA SolverWatermarkingData Preprocessing 2024.02.08 2025.05.27 Literature Database