Transferable Availability Poisoning Attacks Authors: Yiyong Liu, Michael Backes, Xiao Zhang | Published: 2023-10-08 | Updated: 2024-06-06 PoisoningSelection and Evaluation of Optimization AlgorithmsMachine Learning Method 2023.10.08 2025.05.28 Literature Database
Risk factor aggregation and stress testing Authors: Natalie Packham | Published: 2023-10-06 Clustering methodsData CollectionMachine Learning Method 2023.10.06 2025.05.28 Literature Database
Threat Trekker: An Approach to Cyber Threat Hunting Authors: Ángel Casanova Bienzobas, Alfonso Sánchez-Macián | Published: 2023-10-06 Class ImbalanceData CollectionMachine Learning Method 2023.10.06 2025.05.28 Literature Database
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors Authors: Biagio Montaruli, Luca Demetrio, Maura Pintor, Luca Compagna, Davide Balzarotti, Battista Biggio | Published: 2023-10-04 | Updated: 2023-10-14 PhishingPoisoningMachine Learning Method 2023.10.04 2025.05.28 Literature Database
5G Network Slicing: Analysis of Multiple Machine Learning Classifiers Authors: Mirsad Malkoc, Hisham A. Kholidy | Published: 2023-10-03 Security AnalysisNetwork SlicingMachine Learning Method 2023.10.03 2025.05.28 Literature Database
Classification of Spam URLs Using Machine Learning Approaches Authors: Omar Husni Odeh, Anas Arram, Murad Njoum | Published: 2023-09-10 | Updated: 2023-12-03 Spam DetectionLiterature ListMachine Learning Method 2023.09.10 2025.05.28 Literature Database
Predict And Prevent DDOS Attacks Using Machine Learning and Statistical Algorithms Authors: Azadeh Golduzian | Published: 2023-08-30 DDoS AttackMachine Learning MethodFeature Interdependence 2023.08.30 2025.05.28 Literature Database
On the Steganographic Capacity of Selected Learning Models Authors: Rishit Agrawal, Kelvin Jou, Tanush Obili, Daksh Parikh, Samarth Prajapati, Yash Seth, Charan Sridhar, Nathan Zhang, Mark Stamp | Published: 2023-08-29 Data GenerationMachine Learning MethodWatermark Robustness 2023.08.29 2025.05.28 Literature Database
Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection? Authors: Andrea Corsini, Shanchieh Jay Yang | Published: 2023-08-28 Out-of-Distribution DetectionUnknown Attack DetectionMachine Learning Method 2023.08.28 2025.05.28 Literature Database
Active learning for fast and slow modeling attacks on Arbiter PUFs Authors: Vincent Dumoulin, Wenjing Rao, Natasha Devroye | Published: 2023-08-25 Evaluation Methods for PUFActive LearningMachine Learning Method 2023.08.25 2025.05.28 Literature Database