AI-driven Intrusion Detection for UAV in Smart Urban Ecosystems: A Comprehensive Survey Authors: Abdullah Khanfor, Raby Hamadi, Noureddine Lasla, Hakim Ghazzai | Published: 2026-01-27 UAV SecurityData CollectionMachine Learning Algorithm 2026.01.27 2026.01.29 Literature Database
CAFE-GB: Scalable and Stable Feature Selection for Malware Detection via Chunk-wise Aggregated Gradient Boosting Authors: Ajvad Haneef K, Karan Kuwar Singh, Madhu Kumar S D | Published: 2026-01-22 Machine Learning AlgorithmFeature Selection MethodInterpretability 2026.01.22 2026.01.24 Literature Database
Detecting Quishing Attacks with Machine Learning Techniques Through QR Code Analysis Authors: Fouad Trad, Ali Chehab | Published: 2025-05-06 Phishing DetectionModel evaluation methodsMachine Learning Algorithm 2025.05.06 2025.05.27 Literature Database
Accelerating IoV Intrusion Detection: Benchmarking GPU-Accelerated vs CPU-Based ML Libraries Authors: Furkan Çolhak, Hasan Coşkun, Tsafac Nkombong Regine Cyrille, Tedi Hoxa, Mert İlhan Ecevit, Mehmet Nafiz Aydın | Published: 2025-04-02 | Updated: 2025-04-03 Model Performance EvaluationMachine Learning AlgorithmAutomotive Network Security 2025.04.02 2025.05.27 Literature Database
Identifying Obfuscated Code through Graph-Based Semantic Analysis of Binary Code Authors: Roxane Cohen, Robin David, Florian Yger, Fabrice Rossi | Published: 2025-04-02 Explainability of Graph Machine LearningModel Performance EvaluationMachine Learning Algorithm 2025.04.02 2025.05.27 Literature Database
Machine Learning for Encrypted Malicious Traffic Detection: Approaches, Datasets and Comparative Study Authors: Zihao Wang, Kar-Wai Fok, Vrizlynn L. L. Thing | Published: 2022-03-17 Data Management SystemPerformance EvaluationMachine Learning Algorithm 2022.03.17 2025.05.28 Literature Database
Secure Routine: A Routine-Based Algorithm for Drivers Identification Authors: Davide Micale, Gianpiero Costantino, Ilaria Matteucci, Giuseppe Patanè, Giampaolo Bella | Published: 2021-12-12 Machine Learning AlgorithmMachine Learning TechnologyFeature Extraction Method 2021.12.12 2025.05.28 Literature Database
Using Static and Dynamic Malware features to perform Malware Ascription Authors: Jashanpreet Singh Sraw, Keshav Kumar | Published: 2021-12-05 Malware Detection MethodMachine Learning AlgorithmStatic Analysis 2021.12.05 2025.05.28 Literature Database
A tool to support the investigation and visualization of cyber and/or physical incidents Authors: Inês Macedo, Sinan Wanous, Nuno Oliveira, Orlando Sousa, Isabel Praça | Published: 2021-12-02 System ObservabilityData Management SystemMachine Learning Algorithm 2021.12.02 2025.05.28 Literature Database
Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing Authors: Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque | Published: 2021-11-29 Training Data GenerationHardware Trojan DetectionMachine Learning Algorithm 2021.11.29 2025.05.28 Literature Database