Classification of Web Phishing Kits for early detection by platform providers Authors: Andrea Venturi, Michele Colajanni, Marco Ramilli, Giorgio Valenziano Santangelo | Published: 2022-10-15 Security AnalysisMalicious Website DetectionMachine Learning Technology 2022.10.15 2025.05.28 Literature Database
DI-NIDS: Domain Invariant Network Intrusion Detection System Authors: Siamak Layeghy, Mahsa Baktashmotlagh, Marius Portmann | Published: 2022-10-15 Performance EvaluationMachine Learning TechnologyDeep Learning Method 2022.10.15 2025.05.28 Literature Database
Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges Authors: Satwik Patnaik, Vasudev Gohil, Hao Guo, Jeyavijayan, Rajendran | Published: 2022-08-29 Reward Mechanism DesignOptimization ProblemMachine Learning Technology 2022.08.29 2025.05.28 Literature Database
Lateral Movement Detection Using User Behavioral Analysis Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila | Published: 2022-08-29 User Behavior AnalysisMachine Learning TechnologyFeature Extraction Method 2022.08.29 2025.05.28 Literature Database
Overparameterization from Computational Constraints Authors: Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang | Published: 2022-08-27 | Updated: 2022-10-15 Verification of Digital SignaturesMachine Learning TechnologyFunction Definition 2022.08.27 2025.05.28 Literature Database
Credit card fraud detection – Classifier selection strategy Authors: Gayan K. Kulatilleke | Published: 2022-08-25 Fraudulent TransactionMachine LearningMachine Learning Technology 2022.08.25 2025.05.28 Literature Database
Fed-FSNet: Mitigating Non-I.I.D. Federated Learning via Fuzzy Synthesizing Network Authors: Jingcai Guo, Song Guo, Jie Zhang, Ziming Liu | Published: 2022-08-21 | Updated: 2023-04-25 PoisoningEfficiency of Distributed LearningMachine Learning Technology 2022.08.21 2025.05.28 Literature Database
Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset Authors: Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak | Published: 2022-08-20 | Updated: 2022-10-30 Training ProtocolAttack DetectionMachine Learning Technology 2022.08.20 2025.05.28 Literature Database
Profiler: Profile-Based Model to Detect Phishing Emails Authors: Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal | Published: 2022-08-18 Phishing AttackDetection Rate of Phishing AttacksMachine Learning Technology 2022.08.18 2025.05.28 Literature Database
Deception for Cyber Defence: Challenges and Opportunities Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar | Published: 2022-08-15 CybersecurityAttack MethodMachine Learning Technology 2022.08.15 2025.05.28 Literature Database