Harnessing TI Feeds for Exploitation Detection Authors: Kajal Patel, Zubair Shafiq, Mateus Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins | Published: 2024-09-12 IoC Analysis MethodMachine Learning MethodVulnerability Management 2024.09.12 2025.05.27 Literature Database
Ransomware Detection Using Machine Learning in the Linux Kernel Authors: Adrian Brodzik, Tomasz Malec-Kruszyński, Wojciech Niewolski, Mikołaj Tkaczyk, Krzysztof Bocianiak, Sok-Yen Loui | Published: 2024-09-10 System ObservabilityRansomware AssessmentMachine Learning Method 2024.09.10 2025.05.27 Literature Database
NoPhish: Efficient Chrome Extension for Phishing Detection Using Machine Learning Techniques Authors: Leand Thaqi, Arbnor Halili, Kamer Vishi, Blerim Rexha | Published: 2024-09-01 Client-Side ComponentPhishing DetectionMachine Learning Method 2024.09.01 2025.05.27 Literature Database
A Novel Self-Attention-Enabled Weighted Ensemble-Based Convolutional Neural Network Framework for Distributed Denial of Service Attack Classification Authors: Kanthimathi S, Shravan Venkatraman, Jayasankar K S, Pranay Jiljith T, Jashwanth R | Published: 2024-09-01 | Updated: 2024-10-12 DDoS Attack DetectionModel Performance EvaluationMachine Learning Method 2024.09.01 2025.05.27 Literature Database
Zero-day attack and ransomware detection Authors: Steven Jabulani Nhlapo, Mike Nkongolo Wa Nkongolo | Published: 2024-08-08 CybersecurityRansomware AssessmentMachine Learning Method 2024.08.08 2025.05.27 Literature Database
Malicious URL Detection using optimized Hist Gradient Boosting Classifier based on grid search method Authors: Mohammad Maftoun, Nima Shadkam, Seyedeh Somayeh Salehi Komamardakhi, Zulkefli Mansor, Javad Hassannataj Joloudari | Published: 2024-06-12 Model Performance EvaluationMalicious Website DetectionMachine Learning Method 2024.06.12 2025.05.27 Literature Database
Efficient Network Traffic Feature Sets for IoT Intrusion Detection Authors: Miguel Silva, João Vitorino, Eva Maia, Isabel Praça | Published: 2024-06-12 Prompt InjectionModel Performance EvaluationMachine Learning Method 2024.06.12 2025.05.27 Literature Database
When Swarm Learning meets energy series data: A decentralized collaborative learning design based on blockchain Authors: Lei Xu, Yulong Chen, Yuntian Chen, Longfeng Nie, Xuetao Wei, Liang Xue, Dongxiao Zhang | Published: 2024-06-07 Energy ManagementBlockchain TechnologyMachine Learning Method 2024.06.07 2025.05.27 Literature Database
Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDS Authors: Maho Kajiura, Junya Nakamura | Published: 2024-05-20 Network Threat DetectionFrameworkMachine Learning Method 2024.05.20 2025.05.27 Literature Database
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions Authors: Rudolf Ferenc, Péter Hegedűs, Péter Gyimesi, Gábor Antal, Dénes Bán, Tibor Gyimóthy | Published: 2024-05-12 Model Performance EvaluationMachine Learning MethodVulnerability Management 2024.05.12 2025.05.27 Literature Database