Ransomware Classification and Detection With Machine Learning Algorithms Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan | Published: 2022-07-02 Backdoor AttackDynamic AnalysisEvaluation Method 2022.07.02 2025.05.28 Literature Database
Firenze: Model Evaluation Using Weak Signals Authors: Bhavna Soman, Ali Torkamani, Michael J. Morais, Jeffrey Bickford, Baris Coskun | Published: 2022-07-02 Data GenerationModel InterpretabilityEvaluation Method 2022.07.02 2025.05.28 Literature Database
Multifamily Malware Models Authors: Samanvitha Basole, Fabio Di Troia, Mark Stamp | Published: 2022-06-27 Algorithm DesignMalware Propagation MeansEvaluation Method 2022.06.27 2025.05.28 Literature Database
LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks Authors: Kumar Saurabh, Saksham Sood, P. Aditya Kumar, Uphar Singh, Ranjana Vyas, O. P. Vyas, Rahamatullah Khondoker | Published: 2022-06-23 Intrusion Detection SystemDeep Learning MethodEvaluation Method 2022.06.23 2025.05.28 Literature Database
Vulnerability Prioritization: An Offensive Security Approach Authors: Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek | Published: 2022-06-22 Test PrioritizationVulnerability AnalysisEvaluation Method 2022.06.22 2025.05.28 Literature Database
ROSE: A RObust and SEcure DNN Watermarking Authors: Kassem Kallas, Teddy Furon | Published: 2022-06-22 DNN IP Protection MethodAdversarial LearningEvaluation Method 2022.06.22 2025.05.28 Literature Database
A Practical Methodology for ML-Based EM Side Channel Disassemblers Authors: Cesar N. Arguello, Hunter Searle, Sara Rampazzi, Kevin R. B. Butler | Published: 2022-06-21 | Updated: 2022-07-20 Algorithm DesignFeature Extraction MethodEvaluation Method 2022.06.21 2025.05.28 Literature Database
Privacy-Preserving Distributed Machine Learning Made Faster Authors: Zoe L. Jiang, Jiajing Gu, Hongxiao Wang, Yulin Wu, Junbin Fang, Siu-Ming Yiu, Wenjian Luo, Xuan Wang | Published: 2022-05-12 Privacy TechniqueEvaluation MethodFunction Definition 2022.05.12 2025.05.28 Literature Database
On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models Authors: Triet H. M. Le, M. Ali Babar | Published: 2022-03-16 Dataset evaluationVulnerability Attack MethodEvaluation Method 2022.03.16 2025.05.28 Literature Database
Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space Authors: Nuno Oliveira, Norberto Sousa, Jorge Oliveira, Isabel Praça | Published: 2021-12-29 Data CollectionMachine Learning TechnologyEvaluation Method 2021.12.29 2025.05.28 Literature Database