DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20 RAGへのポイズニング攻撃性能評価手法特徴抽出手法 2025.03.20 2025.04.03 文献データベース
Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran | Published: 2023-07-04 特徴抽出手法特徴選択手法計算効率 2023.07.04 2025.04.03 文献データベース
Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices Authors: Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Merouane Debbah, Thierry Lestable, Narinderjit Singh Thandi | Published: 2023-06-25 | Updated: 2024-02-08 マルウェア検出手法特徴抽出手法自然言語処理 2023.06.25 2025.04.03 文献データベース
FLAG: Finding Line Anomalies (in code) with Generative AI Authors: Baleegh Ahmad, Benjamin Tan, Ramesh Karri, Hammond Pearce | Published: 2023-06-22 プログラム解析マルウェア検出手法特徴抽出手法 2023.06.22 2025.04.03 文献データベース
IsoEx: an explainable unsupervised approach to process event logs cyber investigation Authors: Pierre Lavieille, Ismail Alaoui Hassani Atlas | Published: 2023-06-07 | Updated: 2023-07-21 アルゴリズムログ分析の課題特徴抽出手法 2023.06.07 2025.04.03 文献データベース
DPMLBench: Holistic Evaluation of Differentially Private Machine Learning Authors: Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen | Published: 2023-05-10 | Updated: 2023-10-14 トレーニングデータ生成プライバシー評価特徴抽出手法 2023.05.10 2025.04.03 文献データベース
Effects of Real-Life Traffic Sign Alteration on YOLOv7- an Object Recognition Model Authors: Farhin Farhad Riya, Shahinul Hoque, Md Saif Hassan Onim, Edward Michaud, Edmon Begoli, Jinyuan Stella Sun | Published: 2023-05-09 | Updated: 2024-01-29 リアルタイム推論特徴抽出手法画像特徴抽出 2023.05.09 2025.04.03 文献データベース
GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello | Published: 2023-05-01 | Updated: 2024-08-14 ウォーターマーキングプライバシー評価特徴抽出手法 2023.05.01 2025.04.03 文献データベース
Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms Authors: Zihao Wang, Vrizlynn L. L. Thing | Published: 2023-04-07 プロトコル性能評価マルウェア検出手法特徴抽出手法 2023.04.07 2025.04.03 文献データベース
Lateral Movement Detection Using User Behavioral Analysis Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila | Published: 2022-08-29 ユーザ行動分析機械学習技術特徴抽出手法 2022.08.29 2025.04.03 文献データベース