Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System Authors: Syed Ali Raza Shah, Biju Issac | Published: 2017-10-13 | Updated: 2017-11-07 Malware Detection MethodInformation SecurityAnomaly Detection Method 2017.10.13 2025.05.28 Literature Database
Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries Authors: Rui Zhang, Quanyan Zhu | Published: 2017-10-12 Convergence PropertyInformation SecurityStructural Attack 2017.10.12 2025.05.28 Literature Database
Computation on Encrypted Data using Data Flow Authentication Authors: Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden | Published: 2017-10-01 Information SecurityInformation Flow ControlWatermark 2017.10.01 2025.05.28 Literature Database
Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid Authors: Imtiaz Parvez, Maryamossadat Aghili, Arif Sarwat | Published: 2017-09-25 Privacy Enhancing TechnologyInformation SecurityAnomaly Detection Method 2017.09.25 2025.05.28 Literature Database
Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data Authors: Benjamin L. Bullough, Anna K. Yanchenko, Christopher L. Smith, Joseph R. Zipkin | Published: 2017-07-25 Bias in Training DataInformation SecurityMachine Learning Framework 2017.07.25 2025.05.28 Literature Database