Towards Web Phishing Detection Limitations and Mitigation Authors: Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal | Published: 2022-04-03 Website Cloning TechnologyNetwork Threat DetectionMachine Learning 2022.04.03 2025.05.28 Literature Database
Convolutional Neural Networks for Image Spam Detection Authors: Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp | Published: 2022-04-02 Model ArchitectureMachine LearningImage Feature Extraction 2022.04.02 2025.05.28 Literature Database
Scalable Whitebox Attacks on Tree-based Models Authors: Giuseppe Castiglione, Gavin Ding, Masoud Hashemi, Christopher Srinivasa, Ga Wu | Published: 2022-03-31 Machine LearningDurability IssueComputational Complexity 2022.03.31 2025.05.28 Literature Database
Ransomware Detection using Process Memory Authors: Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter | Published: 2022-03-31 AlgorithmData PreprocessingMachine Learning 2022.03.31 2025.05.28 Literature Database
Ovid: A Machine Learning Approach for Automated Vandalism Detection in OpenStreetMap Authors: Nicolas Tempelmeier, Elena Demidova | Published: 2022-03-21 Training Data GenerationAnalysis of Detection MethodsMachine Learning 2022.03.21 2025.05.28 Literature Database
Facial Information Analysis Technology for Gender and Age Estimation Authors: Gilheum Park, Sua Jung | Published: 2021-11-17 AlgorithmMachine LearningAttack that Analyzes Images with AI to Infer Personal Information 2021.11.17 2025.05.28 Literature Database
Automated Security Assessment for the Internet of Things Authors: Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar | Published: 2021-09-09 Risk Assessment MethodMachine LearningVulnerability detection 2021.09.09 2025.05.28 Literature Database
Detecting Attacks on IoT Devices using Featureless 1D-CNN Authors: Arshiya Khan, Chase Cotton | Published: 2021-09-09 Malware Detection MethodMachine LearningCommunication Analysis 2021.09.09 2025.05.28 Literature Database
Transfer Learning for Credit Card Fraud Detection: A Journey from Research to Production Authors: Wissam Siblini, Guillaume Coter, Rémy Fabry, Liyun He-Guelton, Frédéric Oblé, Bertrand Lebichot, Yann-Aël Le Borgne, Gianluca Bontempi | Published: 2021-07-20 | Updated: 2021-11-04 Data Management SystemFraudulent TransactionMachine Learning 2021.07.20 2025.05.28 Literature Database
Android Malware Category and Family Detection and Identification using Machine Learning Authors: Ahmed Hashem El Fiky, Ayman El Shenawy, Mohamed Ashraf Madkour | Published: 2021-07-05 Security AnalysisMachine LearningMachine Learning Technology 2021.07.05 2025.05.28 Literature Database