IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications Authors: KG Raghavendra Narayan, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Anish Chand Turlapaty, Ashok Kumar Das | Published: 2023-08-02 IoT Device IdentificationData PreprocessingVulnerability detection 2023.08.02 2025.05.12 Literature Database
Semisupervised Anomaly Detection using Support Vector Regression with Quantum Kernel Authors: Kilian Tscharke, Sebastian Issel, Pascal Debus | Published: 2023-08-01 | Updated: 2024-01-03 Data GenerationVulnerability detectionQuantum Cryptography Technology 2023.08.01 2025.05.12 Literature Database
Intrusion Detection Systems for Flying Ad-hoc Networks Authors: Jordan Quinn, Safdar Hussain Bouk | Published: 2023-06-08 Energy ManagementNetwork Threat DetectionVulnerability detection 2023.06.08 2025.05.12 Literature Database
An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph Authors: Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad | Published: 2023-04-17 Experimental ValidationVulnerability detectionevaluation metrics 2023.04.17 2025.05.12 Literature Database
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection Authors: Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David Wagner | Published: 2023-04-01 | Updated: 2023-08-09 Security labelPrompt InjectionVulnerability detection 2023.04.01 2025.05.12 Literature Database
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks Authors: Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu | Published: 2023-02-22 | Updated: 2023-04-06 DNN IP Protection MethodWatermarkingVulnerability detection 2023.02.22 2025.05.12 Literature Database
Machine Learning and Port Scans: A Systematic Review Authors: Jason M. Pittman | Published: 2023-01-31 Automation of CybersecurityData CollectionVulnerability detection 2023.01.31 2025.05.12 Literature Database
VulCurator: A Vulnerability-Fixing Commit Detector Authors: Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Xuan-Bach D. Le, David Lo | Published: 2022-09-07 Model Design and AccuracyModel DesignVulnerability detection 2022.09.07 2025.05.12 Literature Database
Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations Authors: Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng | Published: 2022-08-30 Attack DetectionFeature Importance AnalysisVulnerability detection 2022.08.30 2025.05.12 Literature Database
CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models Authors: Chuyen Nguyen, Caleb Morgan, Sudip Mittal | Published: 2022-08-16 Relationship of AI SystemsAttack DetectionVulnerability detection 2022.08.16 2025.05.12 Literature Database