Machine Learning Method

Risk factor aggregation and stress testing

Authors: Natalie Packham | Published: 2023-10-06
Clustering methods
Data Collection
Machine Learning Method

Threat Trekker: An Approach to Cyber Threat Hunting

Authors: Ángel Casanova Bienzobas, Alfonso Sánchez-Macián | Published: 2023-10-06
Class Imbalance
Data Collection
Machine Learning Method

Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors

Authors: Biagio Montaruli, Luca Demetrio, Maura Pintor, Luca Compagna, Davide Balzarotti, Battista Biggio | Published: 2023-10-04 | Updated: 2023-10-14
Phishing
Poisoning
Machine Learning Method

5G Network Slicing: Analysis of Multiple Machine Learning Classifiers

Authors: Mirsad Malkoc, Hisham A. Kholidy | Published: 2023-10-03
Security Analysis
Network Slicing
Machine Learning Method

Classification of Spam URLs Using Machine Learning Approaches

Authors: Omar Husni Odeh, Anas Arram, Murad Njoum | Published: 2023-09-10 | Updated: 2023-12-03
Spam Detection
Literature List
Machine Learning Method

Predict And Prevent DDOS Attacks Using Machine Learning and Statistical Algorithms

Authors: Azadeh Golduzian | Published: 2023-08-30
DDoS Attack
Machine Learning Method
Feature Interdependence

On the Steganographic Capacity of Selected Learning Models

Authors: Rishit Agrawal, Kelvin Jou, Tanush Obili, Daksh Parikh, Samarth Prajapati, Yash Seth, Charan Sridhar, Nathan Zhang, Mark Stamp | Published: 2023-08-29
Data Generation
Machine Learning Method
Watermark Robustness

Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?

Authors: Andrea Corsini, Shanchieh Jay Yang | Published: 2023-08-28
Out-of-Distribution Detection
Unknown Attack Detection
Machine Learning Method

Active learning for fast and slow modeling attacks on Arbiter PUFs

Authors: Vincent Dumoulin, Wenjing Rao, Natasha Devroye | Published: 2023-08-25
Evaluation Methods for PUF
Active Learning
Machine Learning Method

Vulnerability Clustering and other Machine Learning Applications of Semantic Vulnerability Embeddings

Authors: Mark-Oliver Stehr, Minyoung Kim | Published: 2023-08-23
Clustering methods
Membership Inference
Machine Learning Method