データ収集

Privacy Preserving In-memory Computing Engine

Authors: Haoran Geng, Jianqiao Mo, Dayane Reis, Jonathan Takeshita, Taeho Jung, Brandon Reagen, Michael Niemier, Xiaobo Sharon Hu | Published: 2023-08-04 | Updated: 2023-08-10
データ保護手法
データ収集
機械学習手法

Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums

Authors: Felipe Moreno-Vera, Mateus Nogueira, Cainã Figueiredo, Daniel Sadoc Menasché, Miguel Bicudo, Ashton Woiwood, Enrico Lovat, Anton Kocheturov, Leandro Pfleger de Aguiar | Published: 2023-08-03
サイバー攻撃
データ収集
脆弱性管理

Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti | Published: 2023-06-28
IoC解析手法
データ収集
評価指標

Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers

Authors: Alfonso Iacovazzi, Shahid Raza | Published: 2023-06-26
データセット生成
データ収集
マルウェア検出手法

Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier

Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic | Published: 2023-06-15
データ収集
脅威モデリング
計算効率

Effective Feature Extraction for Intrusion Detection System using Non-negative Matrix Factorization and Univariate analysis

Authors: Swapnil Mane, Vaibhav Khatavkar, Niranjan Gijare, Pranav Bhendawade | Published: 2023-04-03
データ収集
機械学習手法
特徴選択手法

It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness

Authors: Peiyu Xiong, Michael Tegegn, Jaskeerat Singh Sarin, Shubhraneel Pal, Julia Rubin | Published: 2023-03-17 | Updated: 2023-10-17
データ収集
モデル性能評価
機械学習の基礎

Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights

Authors: Jay Jacobs, Sasha Romanosky, Octavian Suciu, Benjamin Edwards, Armin Sarabi | Published: 2023-02-27 | Updated: 2023-06-15
データ収集
モデル性能評価
脆弱性予測

Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis

Authors: Chuanpu Fu, Qi Li, Ke Xu | Published: 2023-01-31
データ収集
暗号化トラフィック検出
異常検出手法

Machine Learning and Port Scans: A Systematic Review

Authors: Jason M. Pittman | Published: 2023-01-31
サイバーセキュリティの自動化
データ収集
脆弱性検出