Adversarial Attacks Against Deep Reinforcement Learning Framework in Internet of Vehicles Authors: Anum Talpur, Mohan Gurusamy | Published: 2021-08-02 | Updated: 2021-09-16 Cyber ThreatData Contamination DetectionResource Consumption Analysis 2021.08.02 2025.05.28 Literature Database
Formalizing Distribution Inference Risks Authors: Anshuman Suri, David Evans | Published: 2021-06-07 | Updated: 2021-09-24 Cyber ThreatProperty Inference AttackRisk Assessment Method 2021.06.07 2025.05.28 Literature Database
The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis | Published: 2021-05-25 Cyber AttackCyber ThreatData Collection 2021.05.25 2025.05.28 Literature Database
Tree-based Intelligent Intrusion Detection System in Internet of Vehicles Authors: Li Yang, Abdallah Moubayed, Ismail Hamieh, Abdallah Shami | Published: 2019-10-18 | Updated: 2022-10-05 Cyber ThreatModel EnsembleFeature Importance Analysis 2019.10.18 2025.05.28 Literature Database
Heterogeneous Graph Matching Networks Authors: Shen Wang, Zhengzhang Chen, Xiao Yu, Ding Li, Jingchao Ni, Lu-An Tang, Jiaping Gui, Zhichun Li, Haifeng Chen, Philip S. Yu | Published: 2019-10-17 Graph Neural NetworkGraph Representation LearningCyber Threat 2019.10.17 2025.05.28 Literature Database
Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection Authors: Qian Chen, Sheikh Rabiul Islam, Henry Haswell, Robert A. Bridges | Published: 2019-10-15 Cyber ThreatRansomware AssessmentFeature Selection Method 2019.10.15 2025.05.28 Literature Database
Using Lexical Features for Malicious URL Detection — A Machine Learning Approach Authors: Apoorva Joshi, Levi Lloyd, Paul Westin, Srini Seethapathy | Published: 2019-10-14 Cyber ThreatMalicious Website DetectionMachine Learning Algorithm 2019.10.14 2025.05.28 Literature Database
Using AI/ML to gain situational understanding from passive network observations Authors: D. Verma, S. Calo | Published: 2019-10-14 Cyber ThreatSystem ObservabilityData Collection 2019.10.14 2025.05.28 Literature Database
False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics Authors: Gautam Raj Mode, Prasad Calyam, Khaza Anuarul Hoque | Published: 2019-10-03 | Updated: 2019-12-13 Cyber ThreatAttack EvaluationMachine Learning Algorithm 2019.10.03 2025.05.28 Literature Database
Machine-Learning Techniques for Detecting Attacks in SDN Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut | Published: 2019-10-02 Cyber ThreatAttack EvaluationMachine Learning Algorithm 2019.10.02 2025.05.28 Literature Database