Machine Learning Methods for Network Intrusion Detection Authors: Mouhammad Alkasassbeh, Mohammad Almseidin | Published: 2018-09-01 Dataset evaluationPerformance EvaluationFeature Engineering 2018.09.01 2025.05.13 Literature Database
Anomaly Detection in Cyber Network Data Using a Cyber Language Approach Authors: Bartley D. Richardson, Benjamin J. Radford, Shawn E. Davis, Keegan Hines, David Pekarek | Published: 2018-08-15 CybersecurityDataset evaluationTraffic Characteristic Analysis 2018.08.15 2025.05.13 Literature Database
EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models Authors: Hyrum S. Anderson, Phil Roth | Published: 2018-04-12 | Updated: 2018-04-16 PE File FormatDataset evaluationStatic Malware Detection 2018.04.12 2025.05.13 Literature Database
LRSE: A Lightweight Efficient Searchable Encryption Scheme using Local and Global Representations Authors: Ruihui Zhao, Yuanliang Sun, Mizuho Iwaihara | Published: 2017-05-24 Dataset evaluationPrivacy Protection MechanismPrivacy Issues 2017.05.24 2025.05.13 Literature Database
Musical Instrument Recognition Using Their Distinctive Characteristics in Artificial Neural Networks Authors: Babak Toghiani-Rizi, Marcus Windmark | Published: 2017-05-14 Dataset evaluationFeature Extraction MethodSpeech Enhancement Technology 2017.05.14 2025.05.13 Literature Database