MalIoT: Scalable and Real-time Malware Traffic Detection for IoT Networks Authors: Ethan Weitkamp, Yusuke Satani, Adam Omundsen, Jingwen Wang, Peilong Li | Published: 2023-04-02 LSTM Model Performance EvaluationMalware DetectionMachine Learning Method 2023.04.02 2025.05.28 Literature Database
Information-Based Sensor Placement for Data-Driven Estimation of Unsteady Flows Authors: John Graff, Albert Medina, Francis Lagor | Published: 2023-03-22 Sensor Array DesignMachine Learning MethodState Estimation Method 2023.03.22 2025.05.28 Literature Database
Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms Authors: Nils Weissgerber, Thorsten Jenke, Elmar Padilla, Lilli Bruckschen | Published: 2023-01-12 Data CollectionUnknown Attack DetectionMachine Learning Method 2023.01.12 2025.05.28 Literature Database
Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning Authors: Suman Sourav, Partha P. Biswas, Binbin Chen, Daisuke Mashima | Published: 2022-10-11 Energy ManagementIntrusion Detection SystemMachine Learning Method 2022.10.11 2025.05.28 Literature Database
Intrusion Detection Systems Using Support Vector Machines on the KDDCUP’99 and NSL-KDD Datasets: A Comprehensive Survey Authors: Mikel K. Ngueajio, Gloria Washington, Danda B. Rawat, Yolande Ngueabou | Published: 2022-09-12 Model DesignIntrusion Detection SystemMachine Learning Method 2022.09.12 2025.05.28 Literature Database
SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump Authors: Christofer Fellicious, Stewart Sentanoe, Michael Granitzer, Hans P. Reiser | Published: 2022-09-12 | Updated: 2022-09-13 Memory Management MethodRandom ForestMachine Learning Method 2022.09.12 2025.05.28 Literature Database
Classification Protocols with Minimal Disclosure Authors: Jinshuo Dong, Jason Hartline, Aravindan Vijayaraghavan | Published: 2022-09-06 Convergence GuaranteeMulti-Party ComputationMachine Learning Method 2022.09.06 2025.05.28 Literature Database
Explaining Machine Learning DGA Detectors from DNS Traffic Data Authors: Giorgio Piras, Maura Pintor, Luca Demetrio, Battista Biggio | Published: 2022-08-10 Attack Pattern ExtractionMachine Learning MethodExplainability 2022.08.10 2025.05.28 Literature Database
Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark Authors: Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Mehran Bagheri, Petar Djukic | Published: 2022-08-10 IoT Security RisksPerformance EvaluationMachine Learning Method 2022.08.10 2025.05.28 Literature Database
Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services Authors: Ahmed Omara, Burak Kantarci | Published: 2022-08-09 Performance EvaluationAttack EvaluationMachine Learning Method 2022.08.09 2025.05.28 Literature Database