Empirical Evaluation of SMOTE in Android Malware Detection with Machine Learning: Challenges and Performance in CICMalDroid 2020 Authors: Diego Ferreira Duarte, Andre Augusto Bortoli | Published: 2026-02-09 Data PreprocessingImbalanced Dataset機械学習によるマルウェア分類 2026.02.09 2026.02.11 Literature Database
Quantum AI for Cybersecurity: A hybrid Quantum-Classical models for attack path analysis Authors: Jessica A. Sciammarelli, Waqas Ahmed | Published: 2026-01-05 Security Analysis MethodData PreprocessingQuantum Machine Learning 2026.01.05 2026.01.07 Literature Database
Enhanced Web Payload Classification Using WAMM: An AI-Based Framework for Dataset Refinement and Model Evaluation Authors: Heba Osama, Omar Elebiary, Youssef Qassim, Mohamed Amgad, Ahmed Maghawry, Ahmed Saafan, Haitham Ghalwash | Published: 2025-12-29 SQL Injection Attack DetectionData PreprocessingMachine Learning Technology 2025.12.29 2025.12.31 Literature Database
Leveraging large language models for SQL behavior-based database intrusion detection Authors: Meital Shlezinger, Shay Akirav, Lei Zhou, Liang Guo, Avi Kessel, Guoliang Li | Published: 2025-08-06 | Updated: 2025-08-14 Ensemble LearningData PreprocessingUser Behavior Analysis 2025.08.06 2025.08.16 Literature Database
Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques Authors: Surasit Songma, Watcharakorn Netharn, Siriluck Lorpunmanee | Published: 2024-08-14 CybersecurityData PreprocessingModel Performance Evaluation 2024.08.14 2025.05.27 Literature Database
Diffusion-based Adversarial Purification for Intrusion Detection Authors: Mohamed Amine Merzouk, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens | Published: 2024-06-25 Data PreprocessingAdversarial TrainingAutomated Intrusion Detection System 2024.06.25 2025.05.27 Literature Database
Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez | Published: 2024-05-15 LLM Performance EvaluationData PreprocessingMalware Classification 2024.05.15 2025.05.27 Literature Database
A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection Authors: Raja Giryes, Lior Shafir, Avishai Wool | Published: 2024-05-12 DDoS Attack DetectionData PreprocessingEvaluation Method 2024.05.12 2025.05.27 Literature Database
Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums Authors: Felipe Moreno-Vera | Published: 2024-05-07 CybersecurityData PreprocessingVulnerability Management 2024.05.07 2025.05.27 Literature Database
Distributed Federated Learning-Based Deep Learning Model for Privacy MRI Brain Tumor Detection Authors: Lisang Zhou, Meng Wang, Ning Zhou | Published: 2024-04-15 Data PreprocessingPrivacy ProtectionThreats of Medical AI 2024.04.15 2025.05.27 Literature Database