Machine Learning Method

MalIoT: Scalable and Real-time Malware Traffic Detection for IoT Networks

Authors: Ethan Weitkamp, Yusuke Satani, Adam Omundsen, Jingwen Wang, Peilong Li | Published: 2023-04-02
LSTM Model Performance Evaluation
Malware Detection
Machine Learning Method

Information-Based Sensor Placement for Data-Driven Estimation of Unsteady Flows

Authors: John Graff, Albert Medina, Francis Lagor | Published: 2023-03-22
Sensor Array Design
Machine Learning Method
State Estimation Method

Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms

Authors: Nils Weissgerber, Thorsten Jenke, Elmar Padilla, Lilli Bruckschen | Published: 2023-01-12
Data Collection
Unknown Attack Detection
Machine Learning Method

Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning

Authors: Suman Sourav, Partha P. Biswas, Binbin Chen, Daisuke Mashima | Published: 2022-10-11
Energy Management
Intrusion Detection System
Machine Learning Method

Intrusion Detection Systems Using Support Vector Machines on the KDDCUP’99 and NSL-KDD Datasets: A Comprehensive Survey

Authors: Mikel K. Ngueajio, Gloria Washington, Danda B. Rawat, Yolande Ngueabou | Published: 2022-09-12
Model Design
Intrusion Detection System
Machine Learning Method

SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump

Authors: Christofer Fellicious, Stewart Sentanoe, Michael Granitzer, Hans P. Reiser | Published: 2022-09-12 | Updated: 2022-09-13
Memory Management Method
Random Forest
Machine Learning Method

Classification Protocols with Minimal Disclosure

Authors: Jinshuo Dong, Jason Hartline, Aravindan Vijayaraghavan | Published: 2022-09-06
Convergence Guarantee
Multi-Party Computation
Machine Learning Method

Explaining Machine Learning DGA Detectors from DNS Traffic Data

Authors: Giorgio Piras, Maura Pintor, Luca Demetrio, Battista Biggio | Published: 2022-08-10
Attack Pattern Extraction
Machine Learning Method
Explainability

Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark

Authors: Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Mehran Bagheri, Petar Djukic | Published: 2022-08-10
IoT Security Risks
Performance Evaluation
Machine Learning Method

Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services

Authors: Ahmed Omara, Burak Kantarci | Published: 2022-08-09
Performance Evaluation
Attack Evaluation
Machine Learning Method