AgentCyTE: Leveraging Agentic AI to Generate Cybersecurity Training & Experimentation Scenarios Authors: Ana M. Rodriguez, Jaime Acosta, Anantaa Kotal, Aritran Piplai | Published: 2025-10-29 サービスの構成Network Node ConfigurationPerformance Evaluation 2025.10.29 2025.10.31 Literature Database
An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids Authors: Ömer Sen, Philipp Malskorn, Simon Glomb, Immanuel Hacker, Martin Henze, Andreas Ulbig | Published: 2023-12-21 CybersecurityDataset GenerationNetwork Node Configuration 2023.12.21 2025.05.27 Literature Database
An Online Ensemble Learning Model for Detecting Attacks in Wireless Sensor Networks Authors: Hiba Tabbaa, Samir Ifzarne, Imad Hafidi | Published: 2022-04-28 Online LearningNetwork Node ConfigurationIntrusion Detection System 2022.04.28 2025.05.28 Literature Database
TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection Authors: Sijia Li, Gaopeng Gou, Chang Liu, Chengshang Hou, Zhenzhen Li, Gang Xiong | Published: 2022-04-28 CybersecurityNetwork Node ConfigurationPhishing Attack 2022.04.28 2025.05.28 Literature Database