Feature Selection Method

An Evaluation of Bitcoin Address Classification based on Transaction History Summarization

Authors: Yu-Jing Lin, Po-Wei Wu, Cheng-Han Hsu, I-Ping Tu, Shih-wei Liao | Published: 2019-03-19
Transaction Flow
Feature Selection Method
Statistical Analysis

Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset

Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull | Published: 2018-11-02
IoT Traffic Characteristics
Performance Evaluation Method
Feature Selection Method

Malware triage for early identification of Advanced Persistent Threat activities

Authors: Giuseppe Laurenza, Riccardo Lazzeretti, Luca Mazzotti | Published: 2018-10-16
Malware Detection
Performance Evaluation Metrics
Feature Selection Method

Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing

Authors: Opeyemi Osanaiye, Kim-Kwang Raymond Choo2, Ali Dehghantanha, Zheng Xu, Mqhele Dlodlo | Published: 2018-07-27
Model Evaluation
Machine Learning Application
Feature Selection Method

Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware

Authors: James Baldwin, Ali Dehghantanha | Published: 2018-07-27
Training Protocol
Model Evaluation
Feature Selection Method

Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection

Authors: Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid | Published: 2018-07-22
Model Evaluation
Early Detection Method
Feature Selection Method

Intensive Preprocessing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques

Authors: Ibrahim Obeidat, Nabhan Hamadneh, Mouhammd Al-kasassbeh, Mohammad Almseidin | Published: 2018-05-26 | Updated: 2018-10-05
Data Preprocessing
Attack Detection
Feature Selection Method

You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information

Authors: Beatrice Perez, Mirco Musolesi, Gianluca Stringhini | Published: 2018-03-27 | Updated: 2018-05-14
Privacy Protection
Feature Selection Method
Statistical Analysis

An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods

Authors: Mouhammd Alkasassbeh | Published: 2017-12-27
Machine Learning Algorithm
Feature Selection Method
Communication System

Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach

Authors: Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li | Published: 2017-06-13 | Updated: 2017-10-31
Malware Classification
Detection of Poisonous Data
Feature Selection Method