CIC-Trap4Phish: A Unified Multi-Format Dataset for Phishing and Quishing Attachment Detection Authors: Fatemeh Nejati, Mahdi Rabbani, Mansur Mirani, Gunjan Piya, Igor Opushnyev, Ali A. Ghorbani, Sajjad Dadkhah | Published: 2026-02-09 Phishing DetectionPrompt InjectionFeature Engineering 2026.02.09 2026.02.11 Literature Database
Malware Detection Through Memory Analysis Authors: Sarah Nassar | Published: 2026-02-02 Backdoor DetectionFeature Engineering評価メトリクス 2026.02.02 2026.02.04 Literature Database
Identifying Likely-Reputable Blockchain Projects on Ethereum Authors: Cyrus Malik, Josef Bajada, Joshua Ellul | Published: 2025-03-14 Data Extraction and AnalysisRisk Analysis MethodFeature Engineering 2025.03.14 2025.05.27 Literature Database
FNDaaS: Content-agnostic Detection of Fake News sites Authors: Panagiotis Papadopoulos, Dimitris Spithouris, Evangelos P. Markatos, Nicolas Kourtellis | Published: 2022-12-13 | Updated: 2025-03-18 Detection of MisinformationMalicious Website DetectionFeature Engineering 2022.12.13 2025.05.28 Literature Database
To remove or not remove Mobile Apps? A data-driven predictive model approach Authors: Fadi Mohsen, Dimka Karastoyanova, George Azzopardi | Published: 2022-06-08 Data Management SystemUser Behavior AnalysisFeature Engineering 2022.06.08 2025.05.28 Literature Database
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System Authors: Tuan-Hong Chua, Iftekhar Salam | Published: 2022-03-10 Performance EvaluationDeep Learning MethodFeature Engineering 2022.03.10 2025.05.28 Literature Database
PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection Authors: Talha Ongun, Oliver Spohngellert, Benjamin Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack Davidson, Malathi Veeraraghavan | Published: 2021-12-27 | Updated: 2022-05-24 Feature EngineeringVulnerability AnalysisCommunication Analysis 2021.12.27 2025.05.28 Literature Database
Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem Authors: John Carter, Spiros Mancoridis | Published: 2021-10-29 Machine Learning ApplicationMachine Learning MethodFeature Engineering 2021.10.29 2025.05.28 Literature Database
Patch Shortcuts: Interpretable Proxy Models Efficiently Find Black-Box Vulnerabilities Authors: Julia Rosenzweig, Joachim Sicking, Sebastian Houben, Michael Mock, Maram Akila | Published: 2021-04-22 Multi-Class ClassificationModel DesignFeature Engineering 2021.04.22 2025.05.28 Literature Database
Robustness of ML-Enhanced IDS to Stealthy Adversaries Authors: Vance Wong, John Emanuello | Published: 2021-04-21 ML-Based IDSFeature EngineeringThreat Model 2021.04.21 2025.05.28 Literature Database