Feature Selection Method

Analysis of Machine Learning Approaches to Packing Detection

Authors: Charles-Henry Bertrand Van Ouytsel, Thomas Given-Wilson, Jeremy Minet, Julian Roussieau, Axel Legay | Published: 2021-05-02
PE Malware Classification
Model Selection
Feature Selection Method

CorrAttack: Black-box Adversarial Attack with Structured Search

Authors: Zhichao Huang, Yaowei Huang, Tong Zhang | Published: 2020-10-03
Robustness Evaluation
Deep Learning Method
Feature Selection Method

Algorithm Selection Framework for Cyber Attack Detection

Authors: Marc Chalé, Nathaniel D. Bastian, Jeffery Weir | Published: 2020-05-28
Algorithm
Network Threat Detection
Feature Selection Method

Defending Against Adversarial Machine Learning

Authors: Alison Jenkins | Published: 2019-11-26
Model Performance Evaluation
Feature Selection Method
Statistical Analysis

Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection

Authors: Qian Chen, Sheikh Rabiul Islam, Henry Haswell, Robert A. Bridges | Published: 2019-10-15
Cyber Threat
Ransomware Assessment
Feature Selection Method

Sequence embeddings help to identify fraudulent cases in healthcare insurance

Authors: I. Fursov, A. Zaytsev, R. Khasyanov, M. Spindler, E. Burnaev | Published: 2019-10-07
Membership Inference
Machine Learning Algorithm
Feature Selection Method

Decision Explanation and Feature Importance for Invertible Networks

Authors: Juntang Zhuang, Nicha C. Dvornek, Xiaoxiao Li, Junlin Yang, James S. Duncan | Published: 2019-09-30 | Updated: 2019-10-15
Model Design and Accuracy
Machine Learning Algorithm
Feature Selection Method

Detecting Covert Cryptomining using HPC

Authors: Ankit Gangwal, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti | Published: 2019-08-31 | Updated: 2020-12-15
Future Research
Machine Learning Algorithm
Feature Selection Method

Your Smart Home Can’t Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks

Authors: Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang | Published: 2019-08-31
IoT Traffic Analysis
Privacy Protection Mechanism
Feature Selection Method

Smart Grid Cyber Attacks Detection using Supervised Learning and Heuristic Feature Selection

Authors: Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha | Published: 2019-07-07
Attack Detection
Machine Learning Framework
Feature Selection Method