Network Threat Detection

FlowXpert: Context-Aware Flow Embedding for Enhanced Traffic Detection in IoT Network

Authors: Chao Zha, Haolin Pan, Bing Bai, Jiangxing Wu, Ruyun Zhang | Published: 2025-09-25
トラフィック分類
Network Threat Detection
Analysis of Detection Methods

ExpIDS: A Drift-adaptable Network Intrusion Detection System With Improved Explainability

Authors: Ayush Kumar, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-09-25
XAI (Explainable AI)
Network Threat Detection
Anomaly Detection Method

Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version)

Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23
Network Threat Detection
Research Methodology
Watermark

A Collaborative Intrusion Detection System Using Snort IDS Nodes

Authors: Tom Davies, Max Hashem Eiza, Nathan Shone, Rob Lyon | Published: 2025-04-23
Network Threat Detection
Malware Detection Method
Watermark

Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning

Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26 | Updated: 2025-05-14
Network Threat Detection
User Activity Analysis
Improvement of Learning

AI/ML Based Detection and Categorization of Covert Communication in IPv6 Network

Authors: Mohammad Wali Ur Rahman, Yu-Zheng Lin, Carter Weeks, David Ruddell, Jeff Gabriellini, Bill Hayes, Salim Hariri, Edward V. Ziegler Jr | Published: 2025-01-18
IPv6 Security
Network Threat Detection
Communication Analysis

Adaptive Cybersecurity: Dynamically Retrainable Firewalls for Real-Time Network Protection

Authors: Sina Ahmadi | Published: 2025-01-14
Cybersecurity
Network Threat Detection
Dynamic Firewall

A Novel Approach to Network Traffic Analysis: the HERA tool

Authors: Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-01-13
Cybersecurity
Dataset Generation
Network Threat Detection

Efficient Phishing URL Detection Using Graph-based Machine Learning and Loopy Belief Propagation

Authors: Wenye Guo, Qun Wang, Hao Yue, Haijian Sun, Rose Qingyang Hu | Published: 2025-01-12
Network Threat Detection
Phishing Detection
Convergence Analysis

BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction

Authors: Alaeddine Diaf, Abdelaziz Amara Korba, Nour Elislem Karabadji, Yacine Ghamri-Doudane | Published: 2025-01-03
Cybersecurity
Network Threat Detection
Framework