Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions Authors: Rudolf Ferenc, Péter Hegedűs, Péter Gyimesi, Gábor Antal, Dénes Bán, Tibor Gyimóthy | Published: 2024-05-12 Model Performance EvaluationMachine Learning MethodVulnerability Management 2024.05.12 2025.05.27 Literature Database
Analysis and prevention of AI-based phishing email attacks Authors: Chibuike Samuel Eze, Lior Shamir | Published: 2024-05-08 Dataset GenerationPhishing DetectionMachine Learning Method 2024.05.08 2025.05.27 Literature Database
A Customer Level Fraudulent Activity Detection Benchmark for Enhancing Machine Learning Model Research and Evaluation Authors: Phoebe Jing, Yijing Gao, Xianlong Zeng | Published: 2024-04-23 WatermarkingData Privacy AssessmentMachine Learning Method 2024.04.23 2025.05.27 Literature Database
A Photonic Physically Unclonable Function’s Resilience to Multiple-Valued Machine Learning Attacks Authors: Jessie M. Henderson, Elena R. Henderson, Clayton A. Harper, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-03-02 WatermarkingModel Performance EvaluationMachine Learning Method 2024.03.02 2025.05.27 Literature Database
Multistatic-Radar RCS-Signature Recognition of Aerial Vehicles: A Bayesian Fusion Approach Authors: Michael Potter, Murat Akcakaya, Marius Necsoiu, Gunar Schirner, Deniz Erdogmus, Tales Imbiriba | Published: 2024-02-28 | Updated: 2024-08-16 Training Data GenerationBayesian ClassificationMachine Learning Method 2024.02.28 2025.05.27 Literature Database
An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey Authors: Tosin Ige, Christopher Kiekintveld, Aritran Piplai | Published: 2024-02-26 | Updated: 2024-05-10 SQL Injection Attack DetectionPhishing DetectionMachine Learning Method 2024.02.26 2025.05.27 Literature Database
opML: Optimistic Machine Learning on Blockchain Authors: KD Conway, Cathie So, Xiaohang Yu, Kartin Wong | Published: 2024-01-31 | Updated: 2024-02-05 WatermarkingBlockchain TechnologyMachine Learning Method 2024.01.31 2025.05.27 Literature Database
Ransomware threat mitigation through network traffic analysis and machine learning techniques Authors: Ali Mehrban, Shirin Karimi Geransayeh | Published: 2024-01-27 | Updated: 2024-02-04 CybersecurityRansomware AssessmentMachine Learning Method 2024.01.27 2025.05.27 Literature Database
User authentication system based on human exhaled breath physics Authors: Mukesh Karunanethy, Rahul Tripathi, Mahesh V Panchagnula, Raghunathan Rengaswamy | Published: 2024-01-02 User Authentication SystemTime-Related FeaturesMachine Learning Method 2024.01.02 2025.05.27 Literature Database
Darknet Traffic Analysis A Systematic Literature Review Authors: Javeriah Saleem, Rafiqul Islam, Zahidul Islam | Published: 2023-11-27 Darknet Traffic AnalysisMachine Learning MethodCommunication Analysis 2023.11.27 2025.05.28 Literature Database