Research Methodology

Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version)

Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23
Network Threat Detection
Research Methodology
Watermark

On Benchmarking Code LLMs for Android Malware Analysis

Authors: Yiling He, Hongyu She, Xingzhi Qian, Xinran Zheng, Zhuo Chen, Zhan Qin, Lorenzo Cavallaro | Published: 2025-04-01 | Updated: 2025-04-23
LLM Performance Evaluation
Malware Detection Method
Research Methodology

A Systematic Literature Review on Phishing and Anti-Phishing Techniques

Authors: Ayesha Arshad, Attique Ur Rehman, Sabeen Javaid, Tahir Muhammad Ali, Javed Anjum Sheikh, Muhammad Azeem | Published: 2021-04-02
Phishing Attack
Phishing Detection
Research Methodology

Stack-based Buffer Overflow Detection using Recurrent Neural Networks

Authors: William Arild Dahl, Laszlo Erdodi, Fabio Massimo Zennaro | Published: 2020-12-30
Data Generation Method
Machine Learning Method
Research Methodology

Predicting Organizational Cybersecurity Risk: A Deep Learning Approach

Authors: Benjamin M. Ampel | Published: 2020-12-26
Challenges of Data Labeling
Machine Learning Algorithm
Research Methodology

Twitter Spam Detection: A Systematic Review

Authors: Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, Ebrahim Mahdipour | Published: 2020-11-30 | Updated: 2020-12-01
Spam Detection Method
User Behavior Analysis
Research Methodology

Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence

Authors: Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi | Published: 2020-09-28 | Updated: 2020-10-08
Relationship between Robustness and Privacy
Vulnerability of Adversarial Examples
Research Methodology

Black-box Adversarial Sample Generation Based on Differential Evolution

Authors: Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang | Published: 2020-07-30
Attack Method
Deep Learning
Research Methodology

Enhancing Certified Robustness via Smoothed Weighted Ensembling

Authors: Chizhou Liu, Yunzhen Feng, Ranran Wang, Bin Dong | Published: 2020-05-19 | Updated: 2021-02-23
Algorithm
Generalization Performance
Research Methodology

Secondary Use of Electronic Health Record: Opportunities and Challenges

Authors: Shahid Munir Shah, Rizwan Ahmed Khan | Published: 2020-01-26
Privacy Enhancing Technology
Research Methodology
Clinical Research