Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup Authors: Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai | Published: 2019-05-31 Data Collection MethodNetwork Traffic AnalysisPerformance Evaluation Method 2019.05.31 2025.05.28 Literature Database
Automatically Dismantling Online Dating Fraud Authors: Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica Whitty | Published: 2019-05-29 | Updated: 2019-05-30 Dataset AnalysisData Collection MethodProfile Characteristic Analysis 2019.05.29 2025.05.28 Literature Database
Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods Authors: Simon Duque Antón, Michael Gundall, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28 Data Collection MethodAttack EvaluationMachine Learning 2019.05.28 2025.05.28 Literature Database
Machine Learning Cryptanalysis of a Quantum Random Number Generator Authors: Nhan Duy Truong, Jing Yan Haw, Syed Muhamad Assad, Ping Koy Lam, Omid Kavehei | Published: 2019-05-07 | Updated: 2019-05-13 Data Collection MethodMachine Learning MethodQuantum Computing 2019.05.07 2025.05.28 Literature Database
Cognitive Triaging of Phishing Attacks Authors: Amber van der Heijden, Luca Allodi | Published: 2019-05-06 | Updated: 2019-05-29 Data Collection MethodPoisoningAttack Scenario Analysis 2019.05.06 2025.05.28 Literature Database
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists Authors: Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Abdelberi Chaabane, Kanchana Thilakarathna | Published: 2019-04-24 Data Collection MethodMalware DetectionCrime Detection 2019.04.24 2025.05.28 Literature Database
Detecting ADS-B Spoofing Attacks using Deep Neural Networks Authors: Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran | Published: 2019-04-22 DNN-based Message ClassifierData Collection MethodDeep Learning Technology 2019.04.22 2025.05.28 Literature Database
Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama’s voice using GAN, WaveNet and low-quality found data Authors: Jaime Lorenzo-Trueba, Fuming Fang, Xin Wang, Isao Echizen, Junichi Yamagishi, Tomi Kinnunen | Published: 2018-03-02 Data Collection MethodSpeech Enhancement TechnologySpeech Recognition System 2018.03.02 2025.05.28 Literature Database
Online Feature Ranking for Intrusion Detection Systems Authors: Buse Gul Atli, Alexander Jung | Published: 2018-03-01 | Updated: 2018-06-15 ML-Based IDSData Collection MethodMachine Learning Technology 2018.03.01 2025.05.28 Literature Database
WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices Authors: Qi Lyu, Zhifeng Kong, Chao Shen, Tianwei Yue | Published: 2017-10-22 Data Collection MethodFeature SelectionAuthentication Technology 2017.10.22 2025.05.28 Literature Database