Btech thesis report on adversarial attack detection and purification of adverserially attacked images Authors: Dvij Kalaria | Published: 2022-05-09 Attack DetectionAdversarial ExampleAdaptive Adversarial Training 2022.05.09 2025.05.28 Literature Database
On Generalisability of Machine Learning-based Network Intrusion Detection Systems Authors: Siamak Layeghy, Marius Portmann | Published: 2022-05-09 Performance EvaluationIntrusion Detection SystemAttack Detection 2022.05.09 2025.05.28 Literature Database
Resilient Cooperative Adaptive Cruise Control for Autonomous Vehicles Using Machine Learning Authors: Srivalli Boddupalli, Akash Someshwar Rao, Sandip Ray | Published: 2021-03-18 Attack DetectionAdversarial Attack MethodsRole of Machine Learning 2021.03.18 2025.05.28 Literature Database
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack Authors: Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2021-03-10 Attack DetectionAdversarial attackThreat Model 2021.03.10 2025.05.28 Literature Database
Utilising Flow Aggregation to Classify Benign Imitating Attacks Authors: Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures, Xavier Bellekens | Published: 2021-03-06 Flow Aggregation MethodAttack Detectionevaluation metrics 2021.03.06 2025.05.28 Literature Database
Machine Learning for Detecting Data Exfiltration: A Review Authors: Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire | Published: 2020-12-17 | Updated: 2021-03-21 Dataset evaluationAttack DetectionRole of Machine Learning 2020.12.17 2025.05.28 Literature Database
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center Authors: Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles, Dan Scofield | Published: 2020-12-16 User Behavior AnalysisAttack DetectionRole of Machine Learning 2020.12.16 2025.05.28 Literature Database
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning Authors: Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang | Published: 2020-12-12 DDoS AttackOnline LearningAttack Detection 2020.12.12 2025.05.28 Literature Database
Generalized Insider Attack Detection Implementation using NetFlow Data Authors: Yash Samtani, Jesse Elwell | Published: 2020-10-27 Data Flow AnalysisAttack DetectionMachine Learning Method 2020.10.27 2025.05.28 Literature Database
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection Authors: MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami | Published: 2020-08-09 Performance Evaluation MetricsAttack DetectionMachine Learning Application 2020.08.09 2025.05.28 Literature Database