Network Threat Detection

AdaDoS: Adaptive DoS Attack via Deep Adversarial Reinforcement Learning in SDN

Authors: Wei Shao, Yuhao Wang, Rongguang He, Muhammad Ejaz Ahmed, Seyit Camtepe | Published: 2025-10-23
DoS Mitigation
Network Threat Detection
Model DoS

Exploring the Effect of DNN Depth on Adversarial Attacks in Network Intrusion Detection Systems

Authors: Mohamed ElShehaby, Ashraf Matrawy | Published: 2025-10-22
Network Threat Detection
Model Robustness
Certified Robustness

Monitoring LLM-based Multi-Agent Systems Against Corruptions via Node Evaluation

Authors: Chengcan Wu, Zhixin Zhang, Mingqian Xu, Zeming Wei, Meng Sun | Published: 2025-10-22
Indirect Prompt Injection
エージェント設計
Network Threat Detection

The Attribution Story of WhisperGate: An Academic Perspective

Authors: Oleksandr Adamov, Anders Carlsson | Published: 2025-10-21
RAG
Network Threat Detection
Information Leakage Analysis

SentinelNet: Safeguarding Multi-Agent Collaboration Through Credit-Based Dynamic Threat Detection

Authors: Yang Feng, Xudong Pan | Published: 2025-10-17 | Updated: 2025-10-21
エージェント設計
Network Threat Detection
Model Robustness

FlowXpert: Context-Aware Flow Embedding for Enhanced Traffic Detection in IoT Network

Authors: Chao Zha, Haolin Pan, Bing Bai, Jiangxing Wu, Ruyun Zhang | Published: 2025-09-25
トラフィック分類
Network Threat Detection
Analysis of Detection Methods

ExpIDS: A Drift-adaptable Network Intrusion Detection System With Improved Explainability

Authors: Ayush Kumar, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-09-25
XAI (Explainable AI)
Network Threat Detection
Anomaly Detection Method

Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version)

Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23
Network Threat Detection
Research Methodology
Watermark

A Collaborative Intrusion Detection System Using Snort IDS Nodes

Authors: Tom Davies, Max Hashem Eiza, Nathan Shone, Rob Lyon | Published: 2025-04-23
Network Threat Detection
Malware Detection Method
Watermark

Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning

Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26 | Updated: 2025-05-14
Network Threat Detection
User Activity Analysis
Improvement of Learning