Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices Authors: Ludovic Barman, Alexandre Dumur, Apostolos Pyrgelis, Jean-Pierre Hubaux | Published: 2021-05-24 Data CollectionUser Behavior AnalysisClassification Pattern Analysis 2021.05.24 2025.05.28 Literature Database
Data Curation and Quality Assurance for Machine Learning-based Cyber Intrusion Detection Authors: Haihua Chen, Ngan Tran, Anand Sagar Thumati, Jay Bhuyan, Junhua Ding | Published: 2021-05-20 ML-Based IDSData PreprocessingData Collection 2021.05.20 2025.05.28 Literature Database
Darknet Data Mining — A Canadian Cyber-crime Perspective Authors: Edward Crowder, Jay Lansiquot | Published: 2021-05-18 Darknet Traffic AnalysisData CollectionRisk Management 2021.05.18 2025.05.28 Literature Database
Learner-Private Convex Optimization Authors: Jiaming Xu, Kuang Xu, Dana Yang | Published: 2021-02-23 | Updated: 2021-10-23 Data CollectionData GenerationBayesian Classification 2021.02.23 2025.05.28 Literature Database
IoTDevID: A Behavior-Based Device Identification Method for the IoT Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2021-02-17 | Updated: 2022-07-19 Dataset evaluationData CollectionModel Performance Evaluation 2021.02.17 2025.05.28 Literature Database
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey Authors: Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang | Published: 2021-02-16 | Updated: 2021-11-15 Data Protection MethodData CollectionUser Activity Analysis 2021.02.16 2025.05.28 Literature Database
MalNet: A Large-Scale Image Database of Malicious Software Authors: Scott Freitas, Rahul Duggal, Duen Horng Chau | Published: 2021-01-31 | Updated: 2022-09-04 Data CollectionMalware Detection MethodDeep Transfer Learning 2021.01.31 2025.05.28 Literature Database
Cyber-Attack Consequence Prediction Authors: Prerit Datta, Natalie Lodinger, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-01 | Updated: 2020-12-02 Data CollectionFeature Extraction MethodVulnerability detection 2020.12.01 2025.05.28 Literature Database
Profile Matching Across Online Social Networks Authors: Anisa Halimi, Erman Ayday | Published: 2020-08-20 Data CollectionProfile MatchingMachine Learning Algorithm 2020.08.20 2025.05.28 Literature Database
Cascading Machine Learning to Attack Bitcoin Anonymity Authors: Francesco Zola, Maria Eguimendia, Jan Lukas Bruse, Raul Orduna Urrutia | Published: 2019-10-15 Data CollectionPrivacy ClassificationMachine Learning Algorithm 2019.10.15 2025.05.28 Literature Database