What Does Normal Even Mean? Evaluating Benign Traffic in Intrusion Detection Datasets Authors: Meghan Wilkinson, Robert H Thomson | Published: 2025-09-11 AlgorithmNetwork ForensicsAnomaly Detection Algorithm 2025.09.11 2025.09.13 Literature Database
KubeGuard: LLM-Assisted Kubernetes Hardening via Configuration Files and Runtime Logs Analysis Authors: Omri Sgan Cohen, Ehud Malul, Yair Meidan, Dudu Mimran, Yuval Elovici, Asaf Shabtai | Published: 2025-09-04 Security Strategy GenerationNetwork Forensics監査ログ分析 2025.09.04 2025.09.06 Literature Database
Scout: Leveraging Large Language Models for Rapid Digital Evidence Discovery Authors: Shariq Murtuza | Published: 2025-07-24 デジタル証拠Network Traffic AnalysisNetwork Forensics 2025.07.24 2025.07.26 Literature Database
Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay | Published: 2017-11-08 Network ForensicsBotnet Detection MethodMachine Learning Application 2017.11.08 2025.05.28 Literature Database