DRsam: Detection of Fault-Based Microarchitectural Side-Channel Attacks in RISC-V Using Statistical Preprocessing and Association Rule Mining Authors: Muhammad Hassan, Maria Mushtaq, Jaan Raik, Tara Ghasempouri | Published: 2025-10-21 Program AnalysisFeature ExtractionAnomaly Detection Method 2025.10.21 2025.10.23 Literature Database
PiMRef: Detecting and Explaining Ever-evolving Spear Phishing Emails with Knowledge Base Invariants Authors: Ruofan Liu, Yun Lin, Silas Yeo Shuen Yu, Xiwen Teoh, Zhenkai Liang, Jin Song Dong | Published: 2025-07-21 Social Engineering AttackBusiness Email CompromiseFeature Extraction 2025.07.21 2025.07.23 Literature Database
A Crowdsensing Intrusion Detection Dataset For Decentralized Federated Learning Models Authors: Chao Feng, Alberto Huertas Celdran, Jing Han, Heqing Ren, Xi Cheng, Zien Zeng, Lucas Krauter, Gerome Bovet, Burkhard Stiller | Published: 2025-07-17 IoT Data Analysis TaskPerformance Evaluation MethodFeature Extraction 2025.07.17 2025.07.19 Literature Database
KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs Authors: Xin Fan Guo, Albert Merono Penuela, Sergio Maffeis, Fabio Pierazzi | Published: 2025-06-24 Model Inversion攻撃戦略分析Feature Extraction 2025.06.24 2025.06.26 Literature Database
IntelliAV: Building an Effective On-Device Android Malware Detector Authors: Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto | Published: 2018-02-04 Risk AssessmentMachine Learning MethodFeature Extraction 2018.02.04 2025.05.28 Literature Database