Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection Authors: Marc Schmitt | Published: 2023-10-15 CybersecurityNetwork Threat DetectionMachine Learning Method 2023.10.15 2025.05.27 Literature Database
Adversarial Attacks on Combinatorial Multi-Armed Bandits Authors: Rishab Balasubramanian, Jiawei Li, Prasad Tadepalli, Huazheng Wang, Qingyun Wu, Haoyu Zhao | Published: 2023-10-08 | Updated: 2024-06-04 AlgorithmWatermarkingMachine Learning Method 2023.10.08 2025.05.28 Literature Database
Transferable Availability Poisoning Attacks Authors: Yiyong Liu, Michael Backes, Xiao Zhang | Published: 2023-10-08 | Updated: 2024-06-06 PoisoningSelection and Evaluation of Optimization AlgorithmsMachine Learning Method 2023.10.08 2025.05.28 Literature Database
Risk factor aggregation and stress testing Authors: Natalie Packham | Published: 2023-10-06 Clustering methodsData CollectionMachine Learning Method 2023.10.06 2025.05.28 Literature Database
Threat Trekker: An Approach to Cyber Threat Hunting Authors: Ángel Casanova Bienzobas, Alfonso Sánchez-Macián | Published: 2023-10-06 Class ImbalanceData CollectionMachine Learning Method 2023.10.06 2025.05.28 Literature Database
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors Authors: Biagio Montaruli, Luca Demetrio, Maura Pintor, Luca Compagna, Davide Balzarotti, Battista Biggio | Published: 2023-10-04 | Updated: 2023-10-14 PhishingPoisoningMachine Learning Method 2023.10.04 2025.05.28 Literature Database
5G Network Slicing: Analysis of Multiple Machine Learning Classifiers Authors: Mirsad Malkoc, Hisham A. Kholidy | Published: 2023-10-03 Security AnalysisNetwork SlicingMachine Learning Method 2023.10.03 2025.05.28 Literature Database
Classification of Spam URLs Using Machine Learning Approaches Authors: Omar Husni Odeh, Anas Arram, Murad Njoum | Published: 2023-09-10 | Updated: 2023-12-03 Spam DetectionLiterature ListMachine Learning Method 2023.09.10 2025.05.28 Literature Database
Predict And Prevent DDOS Attacks Using Machine Learning and Statistical Algorithms Authors: Azadeh Golduzian | Published: 2023-08-30 DDoS AttackMachine Learning MethodFeature Interdependence 2023.08.30 2025.05.28 Literature Database
On the Steganographic Capacity of Selected Learning Models Authors: Rishit Agrawal, Kelvin Jou, Tanush Obili, Daksh Parikh, Samarth Prajapati, Yash Seth, Charan Sridhar, Nathan Zhang, Mark Stamp | Published: 2023-08-29 Data GenerationMachine Learning MethodWatermark Robustness 2023.08.29 2025.05.28 Literature Database