Identifying botnet IP address clusters using natural language processing techniques on honeypot command logs Authors: Valentino Crespi, Wes Hardaker, Sami Abu-El-Haija, Aram Galstyan | Published: 2021-04-20 Command AnalysisUser Activity AnalysisTime-Related Features 2021.04.20 2025.05.28 Literature Database
Differentiation of Sliding Rescaled Ranges: New Approach to Encrypted and VPN Traffic Detection Authors: Raoul Nigmatullin, Alexander Ivchenko, Semyon Dorokhin | Published: 2020-12-14 Data Flow AnalysisTime-Related FeaturesRole of Machine Learning 2020.12.14 2025.05.28 Literature Database
Adversarial Examples in Deep Learning for Multivariate Time Series Regression Authors: Gautam Raj Mode, Khaza Anuarul Hoque | Published: 2020-09-24 Multivariate Time Series AnalysisAdversarial ExampleTime-Related Features 2020.09.24 2025.05.28 Literature Database
A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks Authors: Huichen Li, Xiaojun Xu, Chang Liu, Teng Ren, Kun Wu, Xuezhi Cao, Weinan Zhang, Yong Yu, Dawn Song | Published: 2018-04-07 Large Language ModelTime-Related FeaturesStatistical Analysis 2018.04.07 2025.05.28 Literature Database