First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data Authors: Masataka Tasumi, Kazuki Iwahana, Naoto Yanai, Katsunari Shishido, Toshiya Shimizu, Yuji Higuchi, Ikuya Morikawa, Jun Yajima | Published: 2021-09-30 Data Extraction and AnalysisData GenerationPerformance Evaluation 2021.09.30 2025.05.13 Literature Database
An Automated Data Engineering Pipeline for Anomaly Detection of IoT Sensor Data Authors: Xinze Li, Baixi Zou | Published: 2021-09-28 Data Extraction and AnalysisData-Driven ClusteringAnomaly Detection Method 2021.09.28 2025.05.13 Literature Database
A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14 CybersecurityData Extraction and AnalysisMachine Learning Application 2021.09.14 2025.05.13 Literature Database
What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams | Published: 2021-09-14 CybersecurityData Extraction and AnalysisProactive Defense 2021.09.14 2025.05.13 Literature Database
Deep Generative Models to Extend Active Directory Graphs with Honeypot Users Authors: Ondrej Lukas, Sebastian Garcia | Published: 2021-09-13 Graph Neural NetworkData Extraction and AnalysisData Generation 2021.09.13 2025.05.13 Literature Database
Stateful Detection of Model Extraction Attacks Authors: Soham Pal, Yash Gupta, Aditya Kanade, Shirish Shevade | Published: 2021-07-12 Dataset GenerationData Extraction and AnalysisModel Extraction Attack 2021.07.12 2025.05.13 Literature Database
Anomaly Detection using Principles of Human Perception Authors: Nassir Mohammad | Published: 2021-03-23 | Updated: 2022-05-13 Data Extraction and AnalysisAnomaly Detection AlgorithmStatistical Methods 2021.03.23 2025.05.13 Literature Database
Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions Authors: Michael Goebel, Jason Bunk, Srinjoy Chattopadhyay, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-03-19 Data Extraction and AnalysisPoisoningAdversarial Attack Methods 2021.03.19 2025.05.13 Literature Database
Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets Authors: Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed | Published: 2020-10-04 Dataset GenerationData Extraction and AnalysisAttack Method 2020.10.04 2025.05.13 Literature Database
ProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships Authors: Bobby Filar, David French | Published: 2020-08-11 Data Extraction and AnalysisAttacker Behavior AnalysisMachine Learning Framework 2020.08.11 2025.05.13 Literature Database