Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain Authors: A. Besir Kurtulmus, Kenny Daniel | Published: 2018-02-27 Data CollectionModel evaluation methodsMachine Learning Technology 2018.02.27 2025.05.28 Literature Database
WebEye – Automated Collection of Malicious HTTP Traffic Authors: Johann Vierthaler, Roman Kruszelnicki, Julian Schütte | Published: 2018-02-16 Data CollectionUser Activity AnalysisMalicious Website Detection 2018.02.16 2025.05.28 Literature Database
Generative Models for Spear Phishing Posts on Social Media Authors: John Seymour, Philip Tully | Published: 2018-02-14 Data CollectionUser Activity AnalysisMachine Learning Method 2018.02.14 2025.05.28 Literature Database
Characterizing Diabetes, Diet, Exercise, and Obesity Comments on Twitter Authors: Amir Karami, Alicia A. Dahl, Gabrielle Turner-McGrievy, Hadi Kharrazi, Jr., George Shaw | Published: 2017-09-22 Data CollectionData Collection MethodInterpretation of Topic Models 2017.09.22 2025.05.28 Literature Database
Process Monitoring on Sequences of System Call Count Vectors Authors: Michael Dymshits, Ben Myara, David Tolpin | Published: 2017-07-12 Data CollectionMachine Learning ApplicationAnomaly Detection Algorithm 2017.07.12 2025.05.28 Literature Database
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac | Published: 2017-06-30 Data CollectionUser Behavior AnalysisAnomaly Detection Algorithm 2017.06.30 2025.05.28 Literature Database
Analysis of Anomalies in the Internet Traffic Observed at the Campus Network Gateway Authors: Veronica del Carmen Estrada | Published: 2017-06-10 TCP Session ManagementData CollectionAnomaly Detection Algorithm 2017.06.10 2025.05.28 Literature Database