A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection Authors: Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman | Published: 2023-06-29 スケーラビリティ分析ネットワーク脅威検出脆弱性管理 2023.06.29 2025.05.12 Literature Database
Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods Authors: Yuanyuan Wei, Julian Jang-Jaccard, Amardeep Singh, Fariza Sabrina, Seyit Camtepe | Published: 2023-06-27 XAI(説明可能なAI)ネットワーク脅威検出マルウェア分類 2023.06.27 2025.05.12 Literature Database
Intrusion Detection Systems for Flying Ad-hoc Networks Authors: Jordan Quinn, Safdar Hussain Bouk | Published: 2023-06-08 エネルギー管理ネットワーク脅威検出脆弱性検出 2023.06.08 2025.05.12 Literature Database
Uncharted Territory: Energy Attacks in the Battery-less Internet of Things Authors: Luca Mottola, Arslan Hameed, Thiemo Voigt | Published: 2023-04-17 | Updated: 2023-07-17 エネルギーベースモデルネットワーク脅威検出脆弱性回避手法 2023.04.17 2025.05.12 Literature Database
Ransomware Detection and Classification Strategies Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli | Published: 2023-04-10 ネットワーク脅威検出マルウェア検出手法機械学習技術 2023.04.10 2025.05.12 Literature Database
A Multiagent CyberBattleSim for RL Cyber Operation Agents Authors: Thomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, Li Li | Published: 2023-04-03 セキュリティ分析ネットワーク脅威検出教育目的のCTF 2023.04.03 2025.05.12 Literature Database
CoAP-DoS: An IoT Network Intrusion Dataset Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik | Published: 2022-06-29 DoS攻撃IoMTセキュリティネットワーク脅威検出 2022.06.29 2025.05.13 Literature Database
Malware Detection and Prevention using Artificial Intelligence Techniques Authors: Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael Whitman, Alfredo Cuzzocreak, Dan Lo, Akond Rahman, Fan Wu | Published: 2022-06-26 ネットワーク脅威検出悪意のあるパッケージ検出静的分析 2022.06.26 2025.05.13 Literature Database
Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore | Published: 2022-06-06 エンドポイント検出ネットワーク脅威検出強化学習環境 2022.06.06 2025.05.13 Literature Database
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs Authors: Euijin Choo, Mohamed Nabeel, Ravindu De Silva, Ting Yu, Issa Khalil | Published: 2022-05-26 ネットワーク脅威検出マルウェア検出手法悪意のあるURL分析 2022.05.26 2025.05.13 Literature Database