Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers Authors: Alfonso Iacovazzi, Shahid Raza | Published: 2023-06-26 Dataset GenerationData CollectionMalware Detection Method 2023.06.26 2025.05.28 Literature Database
Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic | Published: 2023-06-15 Data CollectionThreat modelingComputational Efficiency 2023.06.15 2025.05.28 Literature Database
Effective Feature Extraction for Intrusion Detection System using Non-negative Matrix Factorization and Univariate analysis Authors: Swapnil Mane, Vaibhav Khatavkar, Niranjan Gijare, Pranav Bhendawade | Published: 2023-04-03 Data CollectionMachine Learning MethodFeature Selection Method 2023.04.03 2025.05.28 Literature Database
It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness Authors: Peiyu Xiong, Michael Tegegn, Jaskeerat Singh Sarin, Shubhraneel Pal, Julia Rubin | Published: 2023-03-17 | Updated: 2023-10-17 Data CollectionModel Performance EvaluationFundamentals of Machine Learning 2023.03.17 2025.05.28 Literature Database
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights Authors: Jay Jacobs, Sasha Romanosky, Octavian Suciu, Benjamin Edwards, Armin Sarabi | Published: 2023-02-27 | Updated: 2023-06-15 Data CollectionModel Performance EvaluationVulnerability Prediction 2023.02.27 2025.05.28 Literature Database
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis Authors: Chuanpu Fu, Qi Li, Ke Xu | Published: 2023-01-31 Data CollectionEncrypted Traffic DetectionAnomaly Detection Method 2023.01.31 2025.05.28 Literature Database
Machine Learning and Port Scans: A Systematic Review Authors: Jason M. Pittman | Published: 2023-01-31 Automation of CybersecurityData CollectionVulnerability detection 2023.01.31 2025.05.28 Literature Database
Behavioural Reports of Multi-Stage Malware Authors: Marcus Carpenter, Chunbo Luo | Published: 2023-01-30 Data CollectionModel Performance EvaluationDynamic Analysis 2023.01.30 2025.05.28 Literature Database
Motion ID: Human Authentication Approach Authors: Aleksei Gavron, Konstantin Belev, Konstantin Kudelkin, Vladislav Shikhov, Andrey Akushevich, Alexey Fartukov, Vladimir Paramonov, Dmitry Syromolotov, Artem Makoyan | Published: 2023-01-25 Data CollectionUser EducationUser Activity Analysis 2023.01.25 2025.05.28 Literature Database
Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities Authors: Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman | Published: 2023-01-17 Data CollectionProgram AnalysisMachine Learning Technology 2023.01.17 2025.05.28 Literature Database