Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier Authors: Yuyang Zhou, Guang Cheng, Shanqing Jiang, Mian Dai | Published: 2019-04-02 | Updated: 2020-04-02 Ensemble LearningMachine Learning Applicationevaluation metrics 2019.04.02 2025.05.28 Literature Database
Deep Learning in steganography and steganalysis from 2015 to 2018 Authors: Marc Chaumont | Published: 2019-03-31 | Updated: 2019-10-16 Steganography TechniquesMachine Learning ApplicationDeep Learning-Based IDS 2019.03.31 2025.05.28 Literature Database
Tackling Android Stego Apps in the Wild Authors: Wenhao Chen, Li Lin, Min Wu, Jennifer Newman | Published: 2018-08-01 Data LeakageMachine Learning ApplicationImage Processing 2018.08.01 2025.05.28 Literature Database
Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing Authors: Opeyemi Osanaiye, Kim-Kwang Raymond Choo2, Ali Dehghantanha, Zheng Xu, Mqhele Dlodlo | Published: 2018-07-27 Model EvaluationMachine Learning ApplicationFeature Selection Method 2018.07.27 2025.05.28 Literature Database
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection Authors: Omar M. K. Alhawi, James Baldwin, Ali Dehghantanha | Published: 2018-07-27 Backdoor DetectionModel EvaluationMachine Learning Application 2018.07.27 2025.05.28 Literature Database
Variance Networks: When Expectation Does Not Meet Your Expectations Authors: Kirill Neklyudov, Dmitry Molchanov, Arsenii Ashukha, Dmitry Vetrov | Published: 2018-03-10 | Updated: 2019-02-18 Bayesian SecurityAdversarial LearningMachine Learning Application 2018.03.10 2025.05.28 Literature Database
Generative Adversarial Positive-Unlabelled Learning Authors: Ming Hou, Brahim Chaib-draa, Chao Li, Qibin Zhao | Published: 2017-11-21 | Updated: 2018-04-04 Machine Learning AlgorithmMachine Learning ApplicationGenerative Model Characteristics 2017.11.21 2025.05.28 Literature Database
AndroVault: Constructing Knowledge Graph from Millions of Android Apps for Automated Analysis Authors: Guozhu Meng, Yinxing Xue, Jing Kai Siow, Ting Su, Annamalai Narayanan, Yang Liu | Published: 2017-11-20 | Updated: 2017-11-21 Dataset IntegrationMachine Learning ApplicationKnowledge Extraction 2017.11.20 2025.05.28 Literature Database
Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay | Published: 2017-11-08 Network ForensicsBotnet Detection MethodMachine Learning Application 2017.11.08 2025.05.28 Literature Database
Process Monitoring on Sequences of System Call Count Vectors Authors: Michael Dymshits, Ben Myara, David Tolpin | Published: 2017-07-12 Data CollectionMachine Learning ApplicationAnomaly Detection Algorithm 2017.07.12 2025.05.28 Literature Database