DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20 Poisoning attack on RAGPerformance Evaluation MethodFeature Extraction Method 2025.03.20 2025.05.27 Literature Database
Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran | Published: 2023-07-04 Feature Extraction MethodFeature Selection MethodComputational Efficiency 2023.07.04 2025.05.28 Literature Database
Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices Authors: Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Merouane Debbah, Thierry Lestable, Narinderjit Singh Thandi | Published: 2023-06-25 | Updated: 2024-02-08 Malware Detection MethodFeature Extraction MethodNatural Language Processing 2023.06.25 2025.05.28 Literature Database
FLAG: Finding Line Anomalies (in code) with Generative AI Authors: Baleegh Ahmad, Benjamin Tan, Ramesh Karri, Hammond Pearce | Published: 2023-06-22 Program AnalysisMalware Detection MethodFeature Extraction Method 2023.06.22 2025.05.28 Literature Database
IsoEx: an explainable unsupervised approach to process event logs cyber investigation Authors: Pierre Lavieille, Ismail Alaoui Hassani Atlas | Published: 2023-06-07 | Updated: 2023-07-21 AlgorithmChallenges of Log AnalysisFeature Extraction Method 2023.06.07 2025.05.28 Literature Database
DPMLBench: Holistic Evaluation of Differentially Private Machine Learning Authors: Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen | Published: 2023-05-10 | Updated: 2023-10-14 Training Data GenerationPrivacy AssessmentFeature Extraction Method 2023.05.10 2025.05.28 Literature Database
Effects of Real-Life Traffic Sign Alteration on YOLOv7- an Object Recognition Model Authors: Farhin Farhad Riya, Shahinul Hoque, Md Saif Hassan Onim, Edward Michaud, Edmon Begoli, Jinyuan Stella Sun | Published: 2023-05-09 | Updated: 2024-01-29 Real-Time InferenceFeature Extraction MethodImage Feature Extraction 2023.05.09 2025.05.28 Literature Database
GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello | Published: 2023-05-01 | Updated: 2024-08-14 WatermarkingPrivacy AssessmentFeature Extraction Method 2023.05.01 2025.05.28 Literature Database
Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms Authors: Zihao Wang, Vrizlynn L. L. Thing | Published: 2023-04-07 Protocol Performance EvaluationMalware Detection MethodFeature Extraction Method 2023.04.07 2025.05.28 Literature Database
Lateral Movement Detection Using User Behavioral Analysis Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila | Published: 2022-08-29 User Behavior AnalysisMachine Learning TechnologyFeature Extraction Method 2022.08.29 2025.05.28 Literature Database