Network Threat Detection

Intrusion Detection Systems for Flying Ad-hoc Networks

Authors: Jordan Quinn, Safdar Hussain Bouk | Published: 2023-06-08
Energy Management
Network Threat Detection
Vulnerability detection

Uncharted Territory: Energy Attacks in the Battery-less Internet of Things

Authors: Luca Mottola, Arslan Hameed, Thiemo Voigt | Published: 2023-04-17 | Updated: 2023-07-17
Energy-Based Model
Network Threat Detection
Vulnerability Mitigation Technique

Ransomware Detection and Classification Strategies

Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli | Published: 2023-04-10
Network Threat Detection
Malware Detection Method
Machine Learning Technology

A Multiagent CyberBattleSim for RL Cyber Operation Agents

Authors: Thomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, Li Li | Published: 2023-04-03
Security Analysis
Network Threat Detection
Educational CTF

CoAP-DoS: An IoT Network Intrusion Dataset

Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik | Published: 2022-06-29
DoS Attack
IoMT Security
Network Threat Detection

Malware Detection and Prevention using Artificial Intelligence Techniques

Authors: Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael Whitman, Alfredo Cuzzocreak, Dan Lo, Akond Rahman, Fan Wu | Published: 2022-06-26
Network Threat Detection
Malicious Package Detection
Static Analysis

Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review

Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore | Published: 2022-06-06
Endpoint Detection
Network Threat Detection
Reinforcement Learning Environment

A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs

Authors: Euijin Choo, Mohamed Nabeel, Ravindu De Silva, Ting Yu, Issa Khalil | Published: 2022-05-26
Network Threat Detection
Malware Detection Method
Malicious URL Analysis

Process Mining Algorithm for Online Intrusion Detection System

Authors: Yinzheng Zhong, John Y. Goulermas, Alexei Lisitsa | Published: 2022-05-24
Data Collection
Network Threat Detection
Attack Type

Towards Web Phishing Detection Limitations and Mitigation

Authors: Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal | Published: 2022-04-03
Website Cloning Technology
Network Threat Detection
Machine Learning