Data Collection

Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain

Authors: A. Besir Kurtulmus, Kenny Daniel | Published: 2018-02-27
Data Collection
Model evaluation methods
Machine Learning Technology

WebEye – Automated Collection of Malicious HTTP Traffic

Authors: Johann Vierthaler, Roman Kruszelnicki, Julian Schütte | Published: 2018-02-16
Data Collection
User Activity Analysis
Malicious Website Detection

Generative Models for Spear Phishing Posts on Social Media

Authors: John Seymour, Philip Tully | Published: 2018-02-14
Data Collection
User Activity Analysis
Machine Learning Method

Characterizing Diabetes, Diet, Exercise, and Obesity Comments on Twitter

Authors: Amir Karami, Alicia A. Dahl, Gabrielle Turner-McGrievy, Hadi Kharrazi, Jr., George Shaw | Published: 2017-09-22
Data Collection
Data Collection Method
Interpretation of Topic Models

Process Monitoring on Sequences of System Call Count Vectors

Authors: Michael Dymshits, Ben Myara, David Tolpin | Published: 2017-07-12
Data Collection
Machine Learning Application
Anomaly Detection Algorithm

6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices

Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac | Published: 2017-06-30
Data Collection
User Behavior Analysis
Anomaly Detection Algorithm

Analysis of Anomalies in the Internet Traffic Observed at the Campus Network Gateway

Authors: Veronica del Carmen Estrada | Published: 2017-06-10
TCP Session Management
Data Collection
Anomaly Detection Algorithm