Model Selection Method

SmartValidator: A Framework for Automatic Identification and Classification of Cyber Threat Data

Authors: Chadni Islam, M. Ali Babar, Roland Croft, Helge Janicke | Published: 2022-03-15
Model Selection Method
Performance Evaluation Metrics
Threat Intelligence

StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection

Authors: Aqib Rashid, Jose Such | Published: 2022-02-15 | Updated: 2023-04-24
Prompt Injection
Model Selection Method
Defense Method

Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines

Authors: Carlos A. Rivera Alvarez, Arash Shaghaghi, David D. Nguyen, Salil S. Kanhere | Published: 2021-11-23
Dataset evaluation
Model Selection Method
Risk Assessment Method

Analyzing Machine Learning Approaches for Online Malware Detection in Cloud

Authors: Jeffrey C Kimmell, Mahmoud Abdelsalam, Maanak Gupta | Published: 2021-05-19
Online Malware Detection
Malware Propagation Means
Model Selection Method

CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks

Authors: Iqbal H. Sarker | Published: 2021-03-28
Multi-Class Classification
Model Selection Method
Machine Learning Technology

Data and Model Dependencies of Membership Inference Attack

Authors: Shakila Mahjabin Tonni, Dinusha Vatsalan, Farhad Farokhi, Dali Kaafar, Zhigang Lu, Gioacchino Tangari | Published: 2020-02-17 | Updated: 2020-07-25
Training Method
Model Selection Method
Defense Method

CEB Improves Model Robustness

Authors: Ian Fischer, Alexander A. Alemi | Published: 2020-02-13
Poisoning
Model Selection Method
Robustness Evaluation

A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid

Authors: Zakaria El Mrabet, Hassan El Ghazi, Naima Kaabouch | Published: 2019-12-31
Model Selection Method
Taxonomy of Attacks
Automated Intrusion Detection System

A Robust Comparison of the KDDCup99 and NSL-KDD IoT Network Intrusion Detection Datasets Through Various Machine Learning Algorithms

Authors: Suchet Sapre, Pouyan Ahmadi, Khondkar Islam | Published: 2019-12-31
Model Selection Method
Taxonomy of Attacks
Automated Intrusion Detection System

Cyber Situation Awareness with Active Learning for Intrusion Detection

Authors: Steven McElwee, James Cannady | Published: 2019-12-29
Model Selection Method
Adversarial Learning
Automated Intrusion Detection System