Data Extraction and Analysis

Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets

Authors: Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed | Published: 2020-10-04
Dataset Generation
Data Extraction and Analysis
Attack Method

ProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships

Authors: Bobby Filar, David French | Published: 2020-08-11
Data Extraction and Analysis
Attacker Behavior Analysis
Machine Learning Framework

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors

Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11
Watermarking
Data Extraction and Analysis
Information Security

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Authors: Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai | Published: 2020-08-10
Data Extraction and Analysis
Machine Learning Framework
Vulnerability Management

Local Differential Privacy and Its Applications: A Comprehensive Survey

Authors: Mengmeng Yang, Lingjuan Lyu, Jun Zhao, Tianqing Zhu, Kwok-Yan Lam | Published: 2020-08-09
Data Extraction and Analysis
Privacy Management
Computational Efficiency

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets

Authors: Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez | Published: 2020-08-07 | Updated: 2021-03-03
Data Extraction and Analysis
Device Identification Method
Resource Usage Analysis

Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification

Authors: Wenjun Qiu, David Lie | Published: 2020-08-07
Active Learning
Data Extraction and Analysis
Privacy Assessment

New Directions in Automated Traffic Analysis

Authors: Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal | Published: 2020-08-06 | Updated: 2021-10-19
Watermarking
Data Extraction and Analysis
Machine Learning

Data Minimization for GDPR Compliance in Machine Learning Models

Authors: Abigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash | Published: 2020-08-06
Data Obfuscation
Data Extraction and Analysis
Role of Machine Learning

Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers

Authors: Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz | Published: 2020-08-02
Data Extraction and Analysis
Privacy Assessment
Malfunction of Voice Assistants