特徴抽出手法

DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence

Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20
RAGへのポイズニング攻撃
性能評価手法
特徴抽出手法

Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction

Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran | Published: 2023-07-04
特徴抽出手法
特徴選択手法
計算効率

Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices

Authors: Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Merouane Debbah, Thierry Lestable, Narinderjit Singh Thandi | Published: 2023-06-25 | Updated: 2024-02-08
マルウェア検出手法
特徴抽出手法
自然言語処理

FLAG: Finding Line Anomalies (in code) with Generative AI

Authors: Baleegh Ahmad, Benjamin Tan, Ramesh Karri, Hammond Pearce | Published: 2023-06-22
プログラム解析
マルウェア検出手法
特徴抽出手法

IsoEx: an explainable unsupervised approach to process event logs cyber investigation

Authors: Pierre Lavieille, Ismail Alaoui Hassani Atlas | Published: 2023-06-07 | Updated: 2023-07-21
アルゴリズム
ログ分析の課題
特徴抽出手法

DPMLBench: Holistic Evaluation of Differentially Private Machine Learning

Authors: Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen | Published: 2023-05-10 | Updated: 2023-10-14
トレーニングデータ生成
プライバシー評価
特徴抽出手法

Effects of Real-Life Traffic Sign Alteration on YOLOv7- an Object Recognition Model

Authors: Farhin Farhad Riya, Shahinul Hoque, Md Saif Hassan Onim, Edward Michaud, Edmon Begoli, Jinyuan Stella Sun | Published: 2023-05-09 | Updated: 2024-01-29
リアルタイム推論
特徴抽出手法
画像特徴抽出

GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference

Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello | Published: 2023-05-01 | Updated: 2024-08-14
ウォーターマーキング
プライバシー評価
特徴抽出手法

Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms

Authors: Zihao Wang, Vrizlynn L. L. Thing | Published: 2023-04-07
プロトコル性能評価
マルウェア検出手法
特徴抽出手法

Lateral Movement Detection Using User Behavioral Analysis

Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila | Published: 2022-08-29
ユーザ行動分析
機械学習技術
特徴抽出手法