Data Collection Method

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup

Authors: Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai | Published: 2019-05-31
Data Collection Method
Network Traffic Analysis
Performance Evaluation Method

Automatically Dismantling Online Dating Fraud

Authors: Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica Whitty | Published: 2019-05-29 | Updated: 2019-05-30
Dataset Analysis
Data Collection Method
Profile Characteristic Analysis

Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods

Authors: Simon Duque Antón, Michael Gundall, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28
Data Collection Method
Attack Evaluation
Machine Learning

Machine Learning Cryptanalysis of a Quantum Random Number Generator

Authors: Nhan Duy Truong, Jing Yan Haw, Syed Muhamad Assad, Ping Koy Lam, Omid Kavehei | Published: 2019-05-07 | Updated: 2019-05-13
Data Collection Method
Machine Learning Method
Quantum Computing

Cognitive Triaging of Phishing Attacks

Authors: Amber van der Heijden, Luca Allodi | Published: 2019-05-06 | Updated: 2019-05-29
Data Collection Method
Poisoning
Attack Scenario Analysis

A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists

Authors: Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Abdelberi Chaabane, Kanchana Thilakarathna | Published: 2019-04-24
Data Collection Method
Malware Detection
Crime Detection

Detecting ADS-B Spoofing Attacks using Deep Neural Networks

Authors: Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran | Published: 2019-04-22
DNN-based Message Classifier
Data Collection Method
Deep Learning Technology

Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama’s voice using GAN, WaveNet and low-quality found data

Authors: Jaime Lorenzo-Trueba, Fuming Fang, Xin Wang, Isao Echizen, Junichi Yamagishi, Tomi Kinnunen | Published: 2018-03-02
Data Collection Method
Speech Enhancement Technology
Speech Recognition System

Online Feature Ranking for Intrusion Detection Systems

Authors: Buse Gul Atli, Alexander Jung | Published: 2018-03-01 | Updated: 2018-06-15
ML-Based IDS
Data Collection Method
Machine Learning Technology

WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices

Authors: Qi Lyu, Zhifeng Kong, Chao Shen, Tianwei Yue | Published: 2017-10-22
Data Collection Method
Feature Selection
Authentication Technology