Network Threat Detection

A Multiagent CyberBattleSim for RL Cyber Operation Agents

Authors: Thomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, Li Li | Published: 2023-04-03
Security Analysis
Network Threat Detection
Educational CTF

CoAP-DoS: An IoT Network Intrusion Dataset

Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik | Published: 2022-06-29
DoS Attack
IoMT Security
Network Threat Detection

Malware Detection and Prevention using Artificial Intelligence Techniques

Authors: Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael Whitman, Alfredo Cuzzocreak, Dan Lo, Akond Rahman, Fan Wu | Published: 2022-06-26
Network Threat Detection
Malicious Package Detection
Static Analysis

Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review

Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore | Published: 2022-06-06
Endpoint Detection
Network Threat Detection
Reinforcement Learning Environment

A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs

Authors: Euijin Choo, Mohamed Nabeel, Ravindu De Silva, Ting Yu, Issa Khalil | Published: 2022-05-26
Network Threat Detection
Malware Detection Method
Malicious URL Analysis

Process Mining Algorithm for Online Intrusion Detection System

Authors: Yinzheng Zhong, John Y. Goulermas, Alexei Lisitsa | Published: 2022-05-24
Data Collection
Network Threat Detection
Attack Type

Towards Web Phishing Detection Limitations and Mitigation

Authors: Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal | Published: 2022-04-03
Website Cloning Technology
Network Threat Detection
Machine Learning

Generating Practical Adversarial Network Traffic Flows Using NIDSGAN

Authors: Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth Krishnamurthy | Published: 2022-03-13
Active Learning
Network Threat Detection
Performance Evaluation

Securing Manufacturing Using Blockchain

Authors: Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin Fidge | Published: 2020-10-15
Network Threat Detection
Blockchain Technology
Machine Learning

Early detection of the advanced persistent threat attack using performance analysis of deep learning

Authors: Javad Hassannataj Joloudari, Mojtaba Haderbadi, Amir Mashmool, Mohammad GhasemiGol, Shahab S., Amir Mosavi | Published: 2020-09-19
Network Threat Detection
Unknown Attack Detection
Vulnerability Management