Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks Authors: Amir Moradibaad, Ramin Jalilian Mashhoud | Published: 2018-12-07 | Updated: 2018-12-13 Malware DetectionResearch MethodologySelection Method 2018.12.07 2025.05.28 Literature Database
Malicious Web Domain Identification using Online Credibility and Performance Data by Considering the Class Imbalance Issue Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Yukun Bao, Yuqing Lin | Published: 2018-10-19 Malware DetectionPerformance Evaluation MetricsResearch Methodology 2018.10.19 2025.05.28 Literature Database
Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection Authors: Jinoh Kim, Caitlin Sim, Jinhwan Choi | Published: 2018-10-03 Data GenerationAnomaly Detection in LogsResearch Methodology 2018.10.03 2025.05.28 Literature Database
DeepImageSpam: Deep Learning based Image Spam Detection Authors: Amara Dinesh Kumar, Vinayakumar R, Soman KP | Published: 2018-10-03 Spam Classification ModelAdversarial Example DetectionResearch Methodology 2018.10.03 2025.05.28 Literature Database
Yedrouj-Net: An efficient CNN for spatial steganalysis Authors: Mehdi Yedroudj, Frederic Comby, Marc Chaumont | Published: 2018-02-26 Privacy Design PrinciplesMachine Learning TechnologyResearch Methodology 2018.02.26 2025.05.28 Literature Database