Decentralized Privacy-Preserving Federal Learning of Computer Vision Models on Edge Devices Authors: Damian Harenčák, Lukáš Gajdošech, Martin Madaras | Published: 2026-01-08 Privacy Protection MethodMachine Learning MethodFederated Learning 2026.01.08 2026.01.10 Literature Database
Unified Framework for Qualifying Security Boundary of PUFs Against Machine Learning Attacks Authors: Hongming Fei, Zilong Hu, Prosanta Gope, Biplab Sikdar | Published: 2026-01-08 Security AnalysisPerformance Evaluation MethodMachine Learning Method 2026.01.08 2026.01.10 Literature Database
A Graph-Based Approach to Alert Contextualisation in Security Operations Centres Authors: Magnus Wiik Eckhoff, Peter Marius Flydal, Siem Peters, Martin Eian, Jonas Halvorsen, Vasileios Mavroeidis, Gudmund Grov | Published: 2025-09-16 Security AnalysisAttack Scenario AnalysisMachine Learning Method 2025.09.16 2025.09.18 Literature Database
Harnessing TI Feeds for Exploitation Detection Authors: Kajal Patel, Zubair Shafiq, Mateus Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins | Published: 2024-09-12 IoC Analysis MethodMachine Learning MethodVulnerability Management 2024.09.12 2025.05.27 Literature Database
Ransomware Detection Using Machine Learning in the Linux Kernel Authors: Adrian Brodzik, Tomasz Malec-Kruszyński, Wojciech Niewolski, Mikołaj Tkaczyk, Krzysztof Bocianiak, Sok-Yen Loui | Published: 2024-09-10 System ObservabilityRansomware AssessmentMachine Learning Method 2024.09.10 2025.05.27 Literature Database
NoPhish: Efficient Chrome Extension for Phishing Detection Using Machine Learning Techniques Authors: Leand Thaqi, Arbnor Halili, Kamer Vishi, Blerim Rexha | Published: 2024-09-01 Client-Side ComponentPhishing DetectionMachine Learning Method 2024.09.01 2025.05.27 Literature Database
A Novel Self-Attention-Enabled Weighted Ensemble-Based Convolutional Neural Network Framework for Distributed Denial of Service Attack Classification Authors: Kanthimathi S, Shravan Venkatraman, Jayasankar K S, Pranay Jiljith T, Jashwanth R | Published: 2024-09-01 | Updated: 2024-10-12 DDoS Attack DetectionModel Performance EvaluationMachine Learning Method 2024.09.01 2025.05.27 Literature Database
Zero-day attack and ransomware detection Authors: Steven Jabulani Nhlapo, Mike Nkongolo Wa Nkongolo | Published: 2024-08-08 CybersecurityRansomware AssessmentMachine Learning Method 2024.08.08 2025.05.27 Literature Database
Malicious URL Detection using optimized Hist Gradient Boosting Classifier based on grid search method Authors: Mohammad Maftoun, Nima Shadkam, Seyedeh Somayeh Salehi Komamardakhi, Zulkefli Mansor, Javad Hassannataj Joloudari | Published: 2024-06-12 Model Performance EvaluationMalicious Website DetectionMachine Learning Method 2024.06.12 2025.05.27 Literature Database
Efficient Network Traffic Feature Sets for IoT Intrusion Detection Authors: Miguel Silva, João Vitorino, Eva Maia, Isabel Praça | Published: 2024-06-12 Prompt InjectionModel Performance EvaluationMachine Learning Method 2024.06.12 2025.05.27 Literature Database