Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák | Published: 2022-06-29 Cyber ThreatSoftware SecurityVulnerability Management 2022.06.29 2025.05.28 Literature Database
Spam Detection Using BERT Authors: Thaer Sahmoud, Mohammad Mikki | Published: 2022-06-06 | Updated: 2022-06-07 Cyber ThreatSpam DetectionPerformance Evaluation 2022.06.06 2025.05.28 Literature Database
Leveraging Machine Learning for Ransomware Detection Authors: Nanda Rani, Sunita Vikrant Dhavale | Published: 2022-06-04 Cyber ThreatHybrid AnalysisDynamic Analysis 2022.06.04 2025.05.28 Literature Database
Evaluating Automated Driving Planner Robustness against Adversarial Influence Authors: Andres Molina-Markham, Silvia G. Ionescu, Erin Lanus, Derek Ng, Sam Sommerer, Joseph J. Rushanan | Published: 2022-05-29 Cyber ThreatTrust EvaluationVehicle Network 2022.05.29 2025.05.28 Literature Database
Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor Authors: Manabu Hirano, Ryotaro Kobayashi | Published: 2022-05-27 | Updated: 2022-08-18 Cyber ThreatData Management SystemMalware Detection Method 2022.05.27 2025.05.28 Literature Database
A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Predictions Authors: Yong Xie, Dakuo Wang, Pin-Yu Chen, Jinjun Xiong, Sijia Liu, Sanmi Koyejo | Published: 2022-05-01 | Updated: 2022-07-12 Attack Methods against DFLCyber ThreatAttack Type 2022.05.01 2025.05.28 Literature Database
Adversarial attacks on an optical neural network Authors: Shuming Jiao, Ziwei Song, Shuiying Xiang | Published: 2022-04-29 Cyber ThreatAttack TypeImage Feature Extraction 2022.04.29 2025.05.28 Literature Database
Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT Authors: Joseph Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis | Published: 2021-09-06 ML-Based IDSCyber ThreatMalware Detection 2021.09.06 2025.05.28 Literature Database
Detection of Insider Threats using Artificial Intelligence and Visualisation Authors: Vasileios Koutsouvelis, Stavros Shiaeles, Bogdan Ghita, Gueltoum Bendiab | Published: 2021-09-06 Cyber ThreatUser Behavior AnalysisLog Analysis Method 2021.09.06 2025.05.28 Literature Database
Predicting Process Name from Network Data Authors: Justin Allen, David Knapp, Kristine Monteith | Published: 2021-09-03 Cyber ThreatFundamentals of Machine LearningDefense Mechanism 2021.09.03 2025.05.28 Literature Database