Towards Malicious address identification in Bitcoin Authors: Deepesh Chaudhari, Rachit Agarwal, Sandeep Kumar Shukla | Published: 2021-12-22 Data PreprocessingFraudulent TransactionTime-Related Features 2021.12.22 2025.05.13 Literature Database
Improving the Reliability of Network Intrusion Detection Systems through Dataset Integration Authors: Roberto Magán-Carrión, Daniel Urda, Ignacio Díaz-Cano, Bernabé Dorronsoro | Published: 2021-12-02 Dataset evaluationData PreprocessingGeneralization Performance 2021.12.02 2025.05.13 Literature Database
A Machine Learning Approach for DDoS Detection on IoT Devices Authors: Alireza Seifousadati, Saeid Ghasemshirazi, Mohammad Fathian | Published: 2021-10-28 DDoS AttackData PreprocessingMachine Learning Method 2021.10.28 2025.05.13 Literature Database
Outlier Detection and Spatial Analysis Algorithms Authors: Jacob John | Published: 2021-06-20 Data PreprocessingData CollectionData-Driven Clustering 2021.06.20 2025.05.13 Literature Database
Network Activities Recognition and Analysis Based on Supervised Machine Learning Classification Methods Using J48 and Naïve Bayes Algorithm Authors: Fan Huang | Published: 2021-05-28 Data PreprocessingData CollectionUser Behavior Analysis 2021.05.28 2025.05.13 Literature Database
MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles Authors: Li Yang, Abdallah Moubayed, Abdallah Shami | Published: 2021-05-26 ML-Based IDSCyber AttackData Preprocessing 2021.05.26 2025.05.13 Literature Database
Data Curation and Quality Assurance for Machine Learning-based Cyber Intrusion Detection Authors: Haihua Chen, Ngan Tran, Anand Sagar Thumati, Jay Bhuyan, Junhua Ding | Published: 2021-05-20 ML-Based IDSData PreprocessingData Collection 2021.05.20 2025.05.13 Literature Database
ADASYN-Random Forest Based Intrusion Detection Model Authors: Zhewei Chen, Wenwen Yu, Linyue Zhou | Published: 2021-05-10 | Updated: 2022-04-14 ML-Based IDSClass ImbalanceData Preprocessing 2021.05.10 2025.05.13 Literature Database
Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection Authors: Haizhou Wang, Peng Liu | Published: 2021-05-06 Class ImbalanceData PreprocessingVulnerability Analysis 2021.05.06 2025.05.13 Literature Database
Extending Isolation Forest for Anomaly Detection in Big Data via K-Means Authors: Md Tahmid Rahman Laskar, Jimmy Huang, Vladan Smetana, Chris Stewart, Kees Pouw, Aijun An, Stephen Chan, Lei Liu | Published: 2021-04-27 ML-Based IDSData PreprocessingModel Performance Evaluation 2021.04.27 2025.05.13 Literature Database