Towards Explainable Meta-Learning for DDoS Detection Authors: Qianru Zhou, Rongzhen Li, Lei Xu, Arumugam Nallanathan, Jian Yang, Anmin Fu | Published: 2022-04-05 | Updated: 2022-08-16 DDoS AttackML-Based IDSMachine Learning 2022.04.05 2025.05.28 Literature Database
Deep Image: A precious image based deep learning method for online malware detection in IoT Environment Authors: Meysam Ghahramani, Rahim Taheri, Mohammad Shojafar, Reza Javidan, Shaohua Wan | Published: 2022-04-04 Dynamic Analysis MethodMachine LearningImage Feature Extraction 2022.04.04 2025.05.28 Literature Database
Towards Web Phishing Detection Limitations and Mitigation Authors: Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal | Published: 2022-04-03 Website Cloning TechnologyNetwork Threat DetectionMachine Learning 2022.04.03 2025.05.28 Literature Database
Convolutional Neural Networks for Image Spam Detection Authors: Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp | Published: 2022-04-02 Model ArchitectureMachine LearningImage Feature Extraction 2022.04.02 2025.05.28 Literature Database
Scalable Whitebox Attacks on Tree-based Models Authors: Giuseppe Castiglione, Gavin Ding, Masoud Hashemi, Christopher Srinivasa, Ga Wu | Published: 2022-03-31 Machine LearningDurability IssueComputational Complexity 2022.03.31 2025.05.28 Literature Database
Ransomware Detection using Process Memory Authors: Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter | Published: 2022-03-31 AlgorithmData PreprocessingMachine Learning 2022.03.31 2025.05.28 Literature Database
Ovid: A Machine Learning Approach for Automated Vandalism Detection in OpenStreetMap Authors: Nicolas Tempelmeier, Elena Demidova | Published: 2022-03-21 Training Data GenerationAnalysis of Detection MethodsMachine Learning 2022.03.21 2025.05.28 Literature Database
Facial Information Analysis Technology for Gender and Age Estimation Authors: Gilheum Park, Sua Jung | Published: 2021-11-17 AlgorithmMachine LearningAttack that Analyzes Images with AI to Infer Personal Information 2021.11.17 2025.05.28 Literature Database
Automated Security Assessment for the Internet of Things Authors: Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar | Published: 2021-09-09 Risk Assessment MethodMachine LearningVulnerability detection 2021.09.09 2025.05.28 Literature Database
Detecting Attacks on IoT Devices using Featureless 1D-CNN Authors: Arshiya Khan, Chase Cotton | Published: 2021-09-09 Malware Detection MethodMachine LearningCommunication Analysis 2021.09.09 2025.05.28 Literature Database