AdaDoS: Adaptive DoS Attack via Deep Adversarial Reinforcement Learning in SDN Authors: Wei Shao, Yuhao Wang, Rongguang He, Muhammad Ejaz Ahmed, Seyit Camtepe | Published: 2025-10-23 DoS MitigationNetwork Threat DetectionModel DoS 2025.10.23 2025.10.25 Literature Database
Exploring the Effect of DNN Depth on Adversarial Attacks in Network Intrusion Detection Systems Authors: Mohamed ElShehaby, Ashraf Matrawy | Published: 2025-10-22 Network Threat DetectionModel RobustnessCertified Robustness 2025.10.22 2025.10.24 Literature Database
Monitoring LLM-based Multi-Agent Systems Against Corruptions via Node Evaluation Authors: Chengcan Wu, Zhixin Zhang, Mingqian Xu, Zeming Wei, Meng Sun | Published: 2025-10-22 Indirect Prompt Injectionエージェント設計Network Threat Detection 2025.10.22 2025.10.24 Literature Database
The Attribution Story of WhisperGate: An Academic Perspective Authors: Oleksandr Adamov, Anders Carlsson | Published: 2025-10-21 RAGNetwork Threat DetectionInformation Leakage Analysis 2025.10.21 2025.10.23 Literature Database
SentinelNet: Safeguarding Multi-Agent Collaboration Through Credit-Based Dynamic Threat Detection Authors: Yang Feng, Xudong Pan | Published: 2025-10-17 | Updated: 2025-10-21 エージェント設計Network Threat DetectionModel Robustness 2025.10.17 2025.10.23 Literature Database
FlowXpert: Context-Aware Flow Embedding for Enhanced Traffic Detection in IoT Network Authors: Chao Zha, Haolin Pan, Bing Bai, Jiangxing Wu, Ruyun Zhang | Published: 2025-09-25 トラフィック分類Network Threat DetectionAnalysis of Detection Methods 2025.09.25 2025.09.27 Literature Database
ExpIDS: A Drift-adaptable Network Intrusion Detection System With Improved Explainability Authors: Ayush Kumar, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-09-25 XAI (Explainable AI)Network Threat DetectionAnomaly Detection Method 2025.09.25 2025.09.27 Literature Database
Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version) Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23 Network Threat DetectionResearch MethodologyWatermark 2025.04.23 2025.05.27 Literature Database
A Collaborative Intrusion Detection System Using Snort IDS Nodes Authors: Tom Davies, Max Hashem Eiza, Nathan Shone, Rob Lyon | Published: 2025-04-23 Network Threat DetectionMalware Detection MethodWatermark 2025.04.23 2025.05.27 Literature Database
Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26 | Updated: 2025-05-14 Network Threat DetectionUser Activity AnalysisImprovement of Learning 2025.01.26 2025.05.27 Literature Database