Data Collection

Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers

Authors: Alfonso Iacovazzi, Shahid Raza | Published: 2023-06-26
Dataset Generation
Data Collection
Malware Detection Method

Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier

Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic | Published: 2023-06-15
Data Collection
Threat modeling
Computational Efficiency

Effective Feature Extraction for Intrusion Detection System using Non-negative Matrix Factorization and Univariate analysis

Authors: Swapnil Mane, Vaibhav Khatavkar, Niranjan Gijare, Pranav Bhendawade | Published: 2023-04-03
Data Collection
Machine Learning Method
Feature Selection Method

It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness

Authors: Peiyu Xiong, Michael Tegegn, Jaskeerat Singh Sarin, Shubhraneel Pal, Julia Rubin | Published: 2023-03-17 | Updated: 2023-10-17
Data Collection
Model Performance Evaluation
Fundamentals of Machine Learning

Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights

Authors: Jay Jacobs, Sasha Romanosky, Octavian Suciu, Benjamin Edwards, Armin Sarabi | Published: 2023-02-27 | Updated: 2023-06-15
Data Collection
Model Performance Evaluation
Vulnerability Prediction

Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis

Authors: Chuanpu Fu, Qi Li, Ke Xu | Published: 2023-01-31
Data Collection
Encrypted Traffic Detection
Anomaly Detection Method

Machine Learning and Port Scans: A Systematic Review

Authors: Jason M. Pittman | Published: 2023-01-31
Automation of Cybersecurity
Data Collection
Vulnerability detection

Behavioural Reports of Multi-Stage Malware

Authors: Marcus Carpenter, Chunbo Luo | Published: 2023-01-30
Data Collection
Model Performance Evaluation
Dynamic Analysis

Motion ID: Human Authentication Approach

Authors: Aleksei Gavron, Konstantin Belev, Konstantin Kudelkin, Vladislav Shikhov, Andrey Akushevich, Alexey Fartukov, Vladimir Paramonov, Dmitry Syromolotov, Artem Makoyan | Published: 2023-01-25
Data Collection
User Education
User Activity Analysis

Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities

Authors: Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman | Published: 2023-01-17
Data Collection
Program Analysis
Machine Learning Technology