Process Mining Algorithm for Online Intrusion Detection System Authors: Yinzheng Zhong, John Y. Goulermas, Alexei Lisitsa | Published: 2022-05-24 Data CollectionNetwork Threat DetectionAttack Type 2022.05.24 2025.05.28 Literature Database
Towards Web Phishing Detection Limitations and Mitigation Authors: Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal | Published: 2022-04-03 Website Cloning TechnologyNetwork Threat DetectionMachine Learning 2022.04.03 2025.05.28 Literature Database
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN Authors: Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth Krishnamurthy | Published: 2022-03-13 Active LearningNetwork Threat DetectionPerformance Evaluation 2022.03.13 2025.05.28 Literature Database
Securing Manufacturing Using Blockchain Authors: Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin Fidge | Published: 2020-10-15 Network Threat DetectionBlockchain TechnologyMachine Learning 2020.10.15 2025.05.28 Literature Database
Early detection of the advanced persistent threat attack using performance analysis of deep learning Authors: Javad Hassannataj Joloudari, Mojtaba Haderbadi, Amir Mashmool, Mohammad GhasemiGol, Shahab S., Amir Mosavi | Published: 2020-09-19 Network Threat DetectionUnknown Attack DetectionVulnerability Management 2020.09.19 2025.05.28 Literature Database
Algorithm Selection Framework for Cyber Attack Detection Authors: Marc Chalé, Nathaniel D. Bastian, Jeffery Weir | Published: 2020-05-28 AlgorithmNetwork Threat DetectionFeature Selection Method 2020.05.28 2025.05.28 Literature Database
An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks SAD-F: Spark Based Anomaly Detection Framework Authors: Awais Ahmed, Sufian Hameed, Muhammad Rafi, Qublai Khan Ali Mirza | Published: 2020-01-21 | Updated: 2020-02-14 DDoS Attack DetectionNetwork Threat DetectionMachine Learning Method 2020.01.21 2025.05.28 Literature Database
Pelican: A Deep Residual Network for Network Intrusion Detection Authors: Peilun Wu, Hui Guo, Nour Moustafa | Published: 2020-01-19 | Updated: 2020-05-08 Network Threat DetectionMachine Learning MethodDeep Reinforcement Learning 2020.01.19 2025.05.28 Literature Database
Attack based DoS attack detection using multiple classifier Authors: Mohamed Abushwereb, Muhannad Mustafa, Mouhammd Al-kasassbeh, Malik Qasaimeh | Published: 2020-01-16 DDoS Attack DetectionNetwork Threat DetectionAdversarial Attack Methods 2020.01.16 2025.05.28 Literature Database