How to Peel a Million: Validating and Expanding Bitcoin Clusters Authors: George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn | Published: 2022-05-27 Data Management SystemTransaction Profit and PerformanceTransparency and Verification 2022.05.27 2025.05.28 Literature Database
Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor Authors: Manabu Hirano, Ryotaro Kobayashi | Published: 2022-05-27 | Updated: 2022-08-18 Cyber ThreatData Management SystemMalware Detection Method 2022.05.27 2025.05.28 Literature Database
Machine Learning for Encrypted Malicious Traffic Detection: Approaches, Datasets and Comparative Study Authors: Zihao Wang, Kar-Wai Fok, Vrizlynn L. L. Thing | Published: 2022-03-17 Data Management SystemPerformance EvaluationMachine Learning Algorithm 2022.03.17 2025.05.28 Literature Database
PUMA: Performance Unchanged Model Augmentation for Training Data Removal Authors: Ga Wu, Masoud Hashemi, Christopher Srinivasa | Published: 2022-03-02 Data Management SystemTrade-off AnalysisPerformance Evaluation Metrics 2022.03.02 2025.05.28 Literature Database
Statistical Feature-based Personal Information Detection in Mobile Network Traffic Authors: Shuang Zhao, Shuhui Chen, Ziling Wei | Published: 2021-12-23 Data Management SystemPrivacy ViolationStatic Analysis 2021.12.23 2025.05.28 Literature Database
Distributed Machine Learning and the Semblance of Trust Authors: Dmitrii Usynin, Alexander Ziller, Daniel Rueckert, Jonathan Passerat-Palmbach, Georgios Kaissis | Published: 2021-12-21 Data Management SystemPrivacy ViolationPoisoning 2021.12.21 2025.05.28 Literature Database
A tool to support the investigation and visualization of cyber and/or physical incidents Authors: Inês Macedo, Sinan Wanous, Nuno Oliveira, Orlando Sousa, Isabel Praça | Published: 2021-12-02 System ObservabilityData Management SystemMachine Learning Algorithm 2021.12.02 2025.05.28 Literature Database
Autoencoder-based Anomaly Detection in Smart Farming Ecosystem Authors: Mary Adkisson, Jeffrey C Kimmel, Maanak Gupta, Mahmoud Abdelsalam | Published: 2021-10-29 Vulnerabilities of IoT DevicesData Management SystemMachine Learning Application 2021.10.29 2025.05.28 Literature Database
A ground-truth dataset of real security patches Authors: Sofia Reis, Rui Abreu | Published: 2021-10-18 Data GenerationData Management SystemAutomated Vulnerability Remediation 2021.10.18 2025.05.28 Literature Database
AI Total: Analyzing Security ML Models with Imperfect Data in Production Authors: Awalin Sopan, Konstantin Berlin | Published: 2021-10-13 Data Management SystemModel SelectionUser Activity Analysis 2021.10.13 2025.05.28 Literature Database