Automated and Explainable Denial of Service Analysis for AI-Driven Intrusion Detection Systems Authors: Paul Badu Yakubu, Lesther Santana, Mohamed Rahouti, Yufeng Xin, Abdellah Chehri, Mohammed Aledhari | Published: 2025-11-06 Traffic Characteristic AnalysisModel DoSFeature Importance Analysis 2025.11.06 2025.11.08 Literature Database
Whisper Leak: a side-channel attack on Large Language Models Authors: Geoff McDonald, Jonathan Bar Or | Published: 2025-11-05 Traffic Characteristic AnalysisPrompt leakingLarge Language Model 2025.11.05 2025.11.07 Literature Database
Crossfire Attack Detection using Deep Learning in Software Defined ITS Networks Authors: Akash Raj Narayanadoss, Tram Truong-Huu, Purnima Murali Mohan, Mohan Gurusamy | Published: 2018-12-10 | Updated: 2019-02-14 Traffic Characteristic AnalysisAttack DetectionDeep Learning 2018.12.10 2025.05.28 Literature Database
Anomaly Detection in Cyber Network Data Using a Cyber Language Approach Authors: Bartley D. Richardson, Benjamin J. Radford, Shawn E. Davis, Keegan Hines, David Pekarek | Published: 2018-08-15 CybersecurityDataset evaluationTraffic Characteristic Analysis 2018.08.15 2025.05.28 Literature Database
Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing Authors: Sashank Narain, Guevara Noubir | Published: 2018-08-13 Access ControlTraffic Characteristic AnalysisPrivacy Design Principles 2018.08.13 2025.05.28 Literature Database
Peek-a-Boo: I see your smart home activities, even encrypted! Authors: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac | Published: 2018-08-08 | Updated: 2020-05-13 IoT SecurityTraffic Characteristic AnalysisMachine Learning Method 2018.08.08 2025.05.28 Literature Database