Machine Learning Algorithm

A tool to support the investigation and visualization of cyber and/or physical incidents

Authors: Inês Macedo, Sinan Wanous, Nuno Oliveira, Orlando Sousa, Isabel Praça | Published: 2021-12-02
System Observability
Data Management System
Machine Learning Algorithm

Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing

Authors: Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque | Published: 2021-11-29
Training Data Generation
Hardware Trojan Detection
Machine Learning Algorithm

HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis

Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-11-08
PDF Malware Analysis
Dataset Generation
Machine Learning Algorithm

A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks

Authors: Poornima Mahadevappa, Syeda Mariam Muzammal, Raja Kumar Murugesan | Published: 2021-11-02
Dataset evaluation
Machine Learning Algorithm
Automated Intrusion Detection System

DP-XGBoost: Private Machine Learning at Scale

Authors: Nicolas Grislain, Joan Gonzalvez | Published: 2021-10-25
Algorithm Design
Privacy Protection
Machine Learning Algorithm

Orthogonal variance-based feature selection for intrusion detection systems

Authors: Firuz Kamalov, Sherif Moussa, Ziad El Khatib, Adel Ben Mnaouer | Published: 2021-10-25
ML-Based IDS
Machine Learning Algorithm
Feature Extraction Method

Poisoning Attacks on Fair Machine Learning

Authors: Minh-Hao Van, Wei Du, Xintao Wu, Aidong Lu | Published: 2021-10-17
Adversarial Attack Methods
Machine Learning Algorithm

A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

Authors: Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya | Published: 2021-10-15
Automation of Cybersecurity
Machine Learning Algorithm
Automated Vulnerability Remediation

Machine Learning Algorithms In User Authentication Schemes

Authors: Laura Pryor, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone | Published: 2021-10-15
User Activity Analysis
Performance Evaluation Metrics
Machine Learning Algorithm

A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity

Authors: Erik Larsen, David Noever, Korey MacVittie | Published: 2021-10-14
Model Selection
Performance Evaluation Metrics
Machine Learning Algorithm