Information Security

Phishing Detection Using Machine Learning Techniques

Authors: Vahid Shahrivari, Mohammad Mahdi Darabi, Mohammad Izadi | Published: 2020-09-20
Performance Evaluation
Malicious Website Detection
Information Security

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors

Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11
Watermarking
Data Extraction and Analysis
Information Security

Detection and Analysis of Drive-by Downloads and Malicious Websites

Authors: Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi | Published: 2020-02-19 | Updated: 2020-04-09
Malware Detection
Information Security
Feature Extraction Method

Intelligent Methods for Accurately Detecting Phishing Websites

Authors: Almaha Abuzuraiq, Mouhammd Alkasassbeh, Mohammad Almseidin | Published: 2020-01-19
Information Security
Machine Learning Algorithm
Feature Extraction Method

Assessing Supply Chain Cyber Risks

Authors: Alberto Redondo, Alberto Torres-Barrán, David Ríos Insua, Jordi Domingo | Published: 2019-11-26
Risk Management
Information Security
Attack Type

Eternal Sunshine of the Spotless Net: Selective Forgetting in Deep Networks

Authors: Aditya Golatkar, Alessandro Achille, Stefano Soatto | Published: 2019-11-12 | Updated: 2020-03-31
Trigger Detection
Machine learning
Information Security

Universal Approximation with Certified Networks

Authors: Maximilian Baader, Matthew Mirman, Martin Vechev | Published: 2019-09-30 | Updated: 2020-01-14
Convergence Analysis
Information Security
Machine Learning Technology

Challenges of Privacy-Preserving Machine Learning in IoT

Authors: Mengyao Zheng, Dixing Xu, Linshan Jiang, Chaojie Gu, Rui Tan, Peng Cheng | Published: 2019-09-21
Privacy Protection Mechanism
Information Security
Machine Learning Application

Enterprise API Security and GDPR Compliance: Design and Implementation Perspective

Authors: Fatima Hussain, Rasheed Hussain, Brett Noye, Salah Sharieh | Published: 2019-09-17
API Security
Privacy Design Principles
Information Security

Road Context-aware Intrusion Detection System for Autonomous Cars

Authors: Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang | Published: 2019-08-02
Intrusion Detection System
Information Security
Deep Learning Method