Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus Authors: William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas | Published: 2018-06-12 CybersecurityTaxonomy of AttacksAdversarial Learning 2018.06.12 2025.05.28 Literature Database
An Efficient Flow-based Multi-level Hybrid Intrusion Detection System for Software-Defined Networks Authors: Majd Latah, Levent Toker | Published: 2018-06-11 FDI Attack Detection MethodsCybersecurityTaxonomy of Attacks 2018.06.11 2025.05.28 Literature Database
Discovering Signals from Web Sources to Predict Cyber Attacks Authors: Palash Goyal, KSM Tozammel Hossain, Ashok Deb, Nazgol Tavabi, Nathan Bartley, Andr'es Abeliuk, Emilio Ferrara, Kristina Lerman | Published: 2018-06-08 CybersecurityInformation Gathering MethodsVulnerability Prediction 2018.06.08 2025.05.28 Literature Database
A Study of EV BMS Cyber Security Based on Neural Network SOC Prediction Authors: Syed Rahman, Haneen Aburub, Yemeserach Mekonnen, Arif I. Sarwat | Published: 2018-06-07 CybersecurityClimate InformationWatermark Evaluation 2018.06.07 2025.05.28 Literature Database
Set-based Obfuscation for Strong PUFs against Machine Learning Attacks Authors: Jiliang Zhang, Chaoqun Shen | Published: 2018-06-06 | Updated: 2019-11-13 CybersecurityUser Authentication SystemWatermark Evaluation 2018.06.06 2025.05.28 Literature Database
Android Malware Detection based on Factorization Machine Authors: Chenglin Li, Keith Mills, Rui Zhu, Di Niu, Hongwen Zhang, Husam Kinawi | Published: 2018-05-30 | Updated: 2019-08-13 CybersecurityFeature Importance AnalysisWatermark Evaluation 2018.05.30 2025.05.28 Literature Database
Secure Mobile Edge Computing in IoT via Collaborative Online Learning Authors: Bingcong Li, Tianyi Chen, Georgios B. Giannakis | Published: 2018-05-09 CybersecurityInformation SecurityAttack Detection 2018.05.09 2025.05.28 Literature Database
Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices Authors: Daniel Hahn, Noah Apthorpe, Nick Feamster | Published: 2018-05-07 CybersecurityInformation SecurityDeep Learning Model 2018.05.07 2025.05.28 Literature Database
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach Authors: Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanacek | Published: 2018-05-07 | Updated: 2018-12-12 CybersecurityAttack DetectionRobustness of Watermarking Techniques 2018.05.07 2025.05.28 Literature Database
What we learn from learning – Understanding capabilities and limitations of machine learning in botnet attacks Authors: David Santana, Shan Suthaharan, Somya Mohanty | Published: 2018-05-03 CybersecurityBotnet TrafficAttack Method 2018.05.03 2025.05.28 Literature Database