A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks Authors: Umara Noor, Sawera Shahid, Rimsha Kanwal, Zahid Rashid | Published: 2023-07-17 Dataset GenerationMachine Learning TechnologyThreat modeling 2023.07.17 2025.05.28 Literature Database
Classifying World War II Era Ciphers with Machine Learning Authors: Brooke Dalton, Mark Stamp | Published: 2023-07-02 | Updated: 2023-08-30 Hyperparameter TuningHistory of CryptographyMachine Learning Technology 2023.07.02 2025.05.28 Literature Database
Is there a Trojan! : Literature survey and critical evaluation of the latest ML based modern intrusion detection systems in IoT environments Authors: Vishal Karanam | Published: 2023-06-14 Security AnalysisModel Performance EvaluationMachine Learning Technology 2023.06.14 2025.05.28 Literature Database
Ransomware Detection and Classification Strategies Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli | Published: 2023-04-10 Network Threat DetectionMalware Detection MethodMachine Learning Technology 2023.04.10 2025.05.28 Literature Database
KeyDetect –Detection of anomalies and user based on Keystroke Dynamics Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08 Security AnalysisPerformance EvaluationMachine Learning Technology 2023.04.08 2025.05.28 Literature Database
IoT Federated Blockchain Learning at the Edge Authors: James Calo, Benny Lo | Published: 2023-04-06 Cloud ComputingThreats of Medical AIMachine Learning Technology 2023.04.06 2025.05.28 Literature Database
Machine-learned Adversarial Attacks against Fault Prediction Systems in Smart Electrical Grids Authors: Carmelo Ardito, Yashar Deldjoo, Tommaso Di Noia, Eugenio Di Sciascio, Fatemeh Nazary, Giovanni Servedio | Published: 2023-03-28 | Updated: 2024-01-30 Automation of CybersecurityAdversarial ExampleMachine Learning Technology 2023.03.28 2025.05.28 Literature Database
How many dimensions are required to find an adversarial example? Authors: Charles Godfrey, Henry Kvinge, Elise Bishoff, Myles Mckay, Davis Brown, Tim Doster, Eleanor Byler | Published: 2023-03-24 | Updated: 2023-04-11 Convergence PropertyAdversarial ExampleMachine Learning Technology 2023.03.24 2025.05.28 Literature Database
Paraphrasing evades detectors of AI-generated text, but retrieval is an effective defense Authors: Kalpesh Krishna, Yixiao Song, Marzena Karpinska, John Wieting, Mohit Iyyer | Published: 2023-03-23 | Updated: 2023-10-18 DNN IP Protection MethodPrompt InjectionMachine Learning Technology 2023.03.23 2025.05.28 Literature Database
A survey on hardware-based malware detection approaches Authors: Cristiano Pegoraro Chenet, Alessandro Savino, Stefano Di Carlo | Published: 2023-03-22 | Updated: 2024-04-18 Challenges of HPCCybersecurityMachine Learning Technology 2023.03.22 2025.05.28 Literature Database