Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms Authors: Nils Weissgerber, Thorsten Jenke, Elmar Padilla, Lilli Bruckschen | Published: 2023-01-12 Data CollectionUnknown Attack DetectionMachine Learning Method 2023.01.12 2025.05.28 Literature Database
Mobile Augmented Reality with Federated Learning in the Metaverse Authors: Xinyu Zhou, Jun Zhao | Published: 2022-12-16 | Updated: 2023-11-07 Data CollectionPrivacy Enhancing TechnologyOptimization Methods 2022.12.16 2025.05.28 Literature Database
Differentially Private AUC Computation in Vertical Federated Learning Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Junyuan Xie, Di Wu, Chong Wang | Published: 2022-05-24 Client-Side ComponentData CollectionWatermark Evaluation 2022.05.24 2025.05.28 Literature Database
Fast & Furious: Modelling Malware Detection as Evolving Data Streams Authors: Fabrício Ceschin, Marcus Botacin, Heitor Murilo Gomes, Felipe Pinagé, Luiz S. Oliveira, André Grégio | Published: 2022-05-24 | Updated: 2022-08-16 Data CollectionMalware DetectionConcept Drift 2022.05.24 2025.05.28 Literature Database
Process Mining Algorithm for Online Intrusion Detection System Authors: Yinzheng Zhong, John Y. Goulermas, Alexei Lisitsa | Published: 2022-05-24 Data CollectionNetwork Threat DetectionAttack Type 2022.05.24 2025.05.28 Literature Database
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam | Published: 2022-04-11 Security AnalysisData CollectionDeep Transfer Learning 2022.04.11 2025.05.28 Literature Database
Assessment of Cyber-Physical Intrusion Detection and Classification for Industrial Control Systems Authors: Nils Müller, Charalampos Ziras, Kai Heussen | Published: 2022-02-18 | Updated: 2023-01-03 Data CollectionMulti-Class ClassificationIntrusion Detection System 2022.02.18 2025.05.28 Literature Database
Case-based reasoning for rare events prediction on strategic sites Authors: Vincent Vidal, Marie-Caroline Corbineau, Tugdual Ceillier | Published: 2022-02-10 Data CollectionData Selection StrategyRisk Prediction and Mitigation 2022.02.10 2025.05.28 Literature Database
Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space Authors: Nuno Oliveira, Norberto Sousa, Jorge Oliveira, Isabel Praça | Published: 2021-12-29 Data CollectionMachine Learning TechnologyEvaluation Method 2021.12.29 2025.05.28 Literature Database
Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP) Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2021-12-14 Data CollectionModel DesignMachine Learning Method 2021.12.14 2025.05.28 Literature Database