Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version) Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23 Network Threat DetectionResearch MethodologyWatermark 2025.04.23 2025.05.27 Literature Database
A Collaborative Intrusion Detection System Using Snort IDS Nodes Authors: Tom Davies, Max Hashem Eiza, Nathan Shone, Rob Lyon | Published: 2025-04-23 Network Threat DetectionMalware Detection MethodWatermark 2025.04.23 2025.05.27 Literature Database
Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26 | Updated: 2025-05-14 Network Threat DetectionUser Activity AnalysisImprovement of Learning 2025.01.26 2025.05.27 Literature Database
AI/ML Based Detection and Categorization of Covert Communication in IPv6 Network Authors: Mohammad Wali Ur Rahman, Yu-Zheng Lin, Carter Weeks, David Ruddell, Jeff Gabriellini, Bill Hayes, Salim Hariri, Edward V. Ziegler Jr | Published: 2025-01-18 IPv6 SecurityNetwork Threat DetectionCommunication Analysis 2025.01.18 2025.05.27 Literature Database
Adaptive Cybersecurity: Dynamically Retrainable Firewalls for Real-Time Network Protection Authors: Sina Ahmadi | Published: 2025-01-14 CybersecurityNetwork Threat DetectionDynamic Firewall 2025.01.14 2025.05.27 Literature Database
A Novel Approach to Network Traffic Analysis: the HERA tool Authors: Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-01-13 CybersecurityDataset GenerationNetwork Threat Detection 2025.01.13 2025.05.27 Literature Database
Efficient Phishing URL Detection Using Graph-based Machine Learning and Loopy Belief Propagation Authors: Wenye Guo, Qun Wang, Hao Yue, Haijian Sun, Rose Qingyang Hu | Published: 2025-01-12 Network Threat DetectionPhishing DetectionConvergence Analysis 2025.01.12 2025.05.27 Literature Database
BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction Authors: Alaeddine Diaf, Abdelaziz Amara Korba, Nour Elislem Karabadji, Yacine Ghamri-Doudane | Published: 2025-01-03 CybersecurityNetwork Threat DetectionFramework 2025.01.03 2025.05.27 Literature Database
Detection and classification of DDoS flooding attacks by machine learning method Authors: Dmytro Tymoshchuk, Oleh Yasniy, Mykola Mytnyk, Nataliya Zagorodna, Vitaliy Tymoshchuk | Published: 2024-12-25 | Updated: 2025-01-02 CybersecurityNetwork Threat Detection 2024.12.25 2025.05.27 Literature Database
QML-IDS: Quantum Machine Learning Intrusion Detection System Authors: Diego Abreu, Christian Esteve Rothenberg, Antonio Abelem | Published: 2024-10-07 CybersecurityNetwork Threat Detection 2024.10.07 2025.05.27 Literature Database