Phishing Detection Using Machine Learning Techniques Authors: Vahid Shahrivari, Mohammad Mahdi Darabi, Mohammad Izadi | Published: 2020-09-20 Performance EvaluationMalicious Website DetectionInformation Security 2020.09.20 2025.05.28 Literature Database
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11 WatermarkingData Extraction and AnalysisInformation Security 2020.08.11 2025.05.28 Literature Database
Detection and Analysis of Drive-by Downloads and Malicious Websites Authors: Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi | Published: 2020-02-19 | Updated: 2020-04-09 Malware DetectionInformation SecurityFeature Extraction Method 2020.02.19 2025.05.28 Literature Database
Intelligent Methods for Accurately Detecting Phishing Websites Authors: Almaha Abuzuraiq, Mouhammd Alkasassbeh, Mohammad Almseidin | Published: 2020-01-19 Information SecurityMachine Learning AlgorithmFeature Extraction Method 2020.01.19 2025.05.28 Literature Database
Assessing Supply Chain Cyber Risks Authors: Alberto Redondo, Alberto Torres-Barrán, David Ríos Insua, Jordi Domingo | Published: 2019-11-26 Risk ManagementInformation SecurityAttack Type 2019.11.26 2025.05.28 Literature Database
Eternal Sunshine of the Spotless Net: Selective Forgetting in Deep Networks Authors: Aditya Golatkar, Alessandro Achille, Stefano Soatto | Published: 2019-11-12 | Updated: 2020-03-31 Trigger DetectionMachine learningInformation Security 2019.11.12 2025.05.28 Literature Database
Universal Approximation with Certified Networks Authors: Maximilian Baader, Matthew Mirman, Martin Vechev | Published: 2019-09-30 | Updated: 2020-01-14 Convergence AnalysisInformation SecurityMachine Learning Technology 2019.09.30 2025.05.28 Literature Database
Challenges of Privacy-Preserving Machine Learning in IoT Authors: Mengyao Zheng, Dixing Xu, Linshan Jiang, Chaojie Gu, Rui Tan, Peng Cheng | Published: 2019-09-21 Privacy Protection MechanismInformation SecurityMachine Learning Application 2019.09.21 2025.05.28 Literature Database
Enterprise API Security and GDPR Compliance: Design and Implementation Perspective Authors: Fatima Hussain, Rasheed Hussain, Brett Noye, Salah Sharieh | Published: 2019-09-17 API SecurityPrivacy Design PrinciplesInformation Security 2019.09.17 2025.05.28 Literature Database
Road Context-aware Intrusion Detection System for Autonomous Cars Authors: Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang | Published: 2019-08-02 Intrusion Detection SystemInformation SecurityDeep Learning Method 2019.08.02 2025.05.28 Literature Database