Reframing Threat Detection: Inside esINSIDER Authors: M. Arthur Munson, Jason Kichen, Dustin Hillard, Ashley Fidler, Peiter Zatko | Published: 2019-04-07 Data Origins and EvolutionInternal Network ReconnaissanceAnomaly Detection Method 2019.04.07 2025.05.28 Literature Database
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection Authors: Mahdieh Zabihimayvan, Derek Doran | Published: 2019-03-13 Phishing DetectionFeature InterdependenceAnomaly Detection Method 2019.03.13 2025.05.28 Literature Database
Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques Authors: Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac | Published: 2018-04-13 FDI Attack Detection MethodsPerformance EvaluationAnomaly Detection Method 2018.04.13 2025.05.28 Literature Database
A Grid Based Adversarial Clustering Algorithm Authors: Wutao Wei, Nikhil Gupta, Bowei Xi | Published: 2018-04-13 | Updated: 2024-11-21 Data Contamination DetectionAdversarial Attack AnalysisAnomaly Detection Method 2018.04.13 2025.05.28 Literature Database
Machine Learning DDoS Detection for Consumer Internet of Things Devices Authors: Rohan Doshi, Noah Apthorpe, Nick Feamster | Published: 2018-04-11 Model DoSIoT Threat Detection in Home RoutersAnomaly Detection Method 2018.04.11 2025.05.28 Literature Database
The Challenges in SDN/ML Based Network Security : A Survey Authors: Tam N. Nguyen | Published: 2018-04-08 | Updated: 2018-04-14 SDN Security SolutionModel Extraction AttackAnomaly Detection Method 2018.04.08 2025.05.28 Literature Database