E-PhishGen: Unlocking Novel Research in Phishing Email Detection Authors: Luca Pajola, Eugenio Caripoti, Stefan Banzer, Simeone Pizzi, Mauro Conti, Giovanni Apruzzese | Published: 2025-09-01 | Updated: 2025-09-15 データセットの問題Phishing DetectionMachine Learning 2025.09.01 2025.09.17 Literature Database
Password Strength Detection via Machine Learning: Analysis, Modeling, and Evaluation Authors: Jiazhi Mo, Hailu Kuang, Xiaoqi Li | Published: 2025-05-22 Data Origins and EvolutionパスワードセキュリティMachine Learning 2025.05.22 2025.05.28 Literature Database
Private Transformer Inference in MLaaS: A Survey Authors: Yang Li, Xinyu Zhou, Yitong Wang, Liangxin Qian, Jun Zhao | Published: 2025-05-15 Encryption TechnologyMachine LearningComputational Consistency 2025.05.15 2025.05.28 Literature Database
Malicious Code Detection in Smart Contracts via Opcode Vectorization Authors: Huanhuan Zou, Zongwei Li, Xiaoqi Li | Published: 2025-04-17 Smart Contract AuditMachine LearningVulnerability Management 2025.04.17 2025.05.27 Literature Database
Using Topological Data Analysis to classify Encrypted Bits Authors: Jayati Kaushik, Aaruni Kaushik, Upasana Parashar | Published: 2023-01-18 Algorithm DesignMachine LearningImage Forensics 2023.01.18 2025.05.28 Literature Database
Detection of Malicious Websites Using Machine Learning Techniques Authors: Adebayo Oshingbesan, Courage Ekoh, Chukwuemeka Okobi, Aime Munezero, Kagame Richard | Published: 2022-09-13 Dataset GenerationModel Performance EvaluationMachine Learning 2022.09.13 2025.05.28 Literature Database
Exploiting Nanoelectronic Properties of Memory Chips for Prevention of IC Counterfeiting Authors: Supriya Chakraborty, Tamoghno Das, Manan Suri | Published: 2022-09-09 IC Counterfeiting Prevention MethodMemory Management MethodMachine Learning 2022.09.09 2025.05.28 Literature Database
Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study Authors: Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo | Published: 2022-08-25 CybersecurityAttack DetectionMachine Learning 2022.08.25 2025.05.28 Literature Database
Empirical study of Machine Learning Classifier Evaluation Metrics behavior in Massively Imbalanced and Noisy data Authors: Gayan K. Kulatilleke, Sugandika Samarakoon | Published: 2022-08-25 Fraudulent TransactionAnalysis of Detection MethodsMachine Learning 2022.08.25 2025.05.28 Literature Database
Credit card fraud detection – Classifier selection strategy Authors: Gayan K. Kulatilleke | Published: 2022-08-25 Fraudulent TransactionMachine LearningMachine Learning Technology 2022.08.25 2025.05.28 Literature Database