An Evaluation of Bitcoin Address Classification based on Transaction History Summarization Authors: Yu-Jing Lin, Po-Wei Wu, Cheng-Han Hsu, I-Ping Tu, Shih-wei Liao | Published: 2019-03-19 Transaction FlowFeature Selection MethodStatistical Analysis 2019.03.19 2025.05.28 Literature Database
Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull | Published: 2018-11-02 IoT Traffic CharacteristicsPerformance Evaluation MethodFeature Selection Method 2018.11.02 2025.05.28 Literature Database
Malware triage for early identification of Advanced Persistent Threat activities Authors: Giuseppe Laurenza, Riccardo Lazzeretti, Luca Mazzotti | Published: 2018-10-16 Malware DetectionPerformance Evaluation MetricsFeature Selection Method 2018.10.16 2025.05.28 Literature Database
Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing Authors: Opeyemi Osanaiye, Kim-Kwang Raymond Choo2, Ali Dehghantanha, Zheng Xu, Mqhele Dlodlo | Published: 2018-07-27 Model EvaluationMachine Learning ApplicationFeature Selection Method 2018.07.27 2025.05.28 Literature Database
Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware Authors: James Baldwin, Ali Dehghantanha | Published: 2018-07-27 Training ProtocolModel EvaluationFeature Selection Method 2018.07.27 2025.05.28 Literature Database
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection Authors: Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid | Published: 2018-07-22 Model EvaluationEarly Detection MethodFeature Selection Method 2018.07.22 2025.05.28 Literature Database
Intensive Preprocessing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques Authors: Ibrahim Obeidat, Nabhan Hamadneh, Mouhammd Al-kasassbeh, Mohammad Almseidin | Published: 2018-05-26 | Updated: 2018-10-05 Data PreprocessingAttack DetectionFeature Selection Method 2018.05.26 2025.05.28 Literature Database
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information Authors: Beatrice Perez, Mirco Musolesi, Gianluca Stringhini | Published: 2018-03-27 | Updated: 2018-05-14 Privacy ProtectionFeature Selection MethodStatistical Analysis 2018.03.27 2025.05.28 Literature Database
An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods Authors: Mouhammd Alkasassbeh | Published: 2017-12-27 Machine Learning AlgorithmFeature Selection MethodCommunication System 2017.12.27 2025.05.28 Literature Database
Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach Authors: Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li | Published: 2017-06-13 | Updated: 2017-10-31 Malware ClassificationDetection of Poisonous DataFeature Selection Method 2017.06.13 2025.05.28 Literature Database