Search

Showing total 101 results

Search Constraints

Start Over You searched for: Topic machine learning Remove constraint Topic: machine learning Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years Journal international journal of information security Remove constraint Journal: international journal of information security Publisher springer nature Remove constraint Publisher: springer nature
101 results

Search Results

1. A review on graph-based approaches for network security monitoring and botnet detection.

2. Early web application attack detection using network traffic analysis.

3. From zero-shot machine learning to zero-day attack detection.

4. BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks.

5. Securing MQTT protocol for IoT environment using IDS based on ensemble learning.

6. Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities.

7. Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware.

8. Defense against membership inference attack in graph neural networks through graph perturbation.

9. Malware classification approaches utilizing binary and text encoding of permissions.

10. Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.

11. Malicious website identification using design attribute learning.

12. cFEM: a cluster based feature extraction method for network intrusion detection.

13. A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes.

14. A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications.

15. Swarm-intelligence for the modern ICT ecosystems.

16. Model-Agnostic Utility-Preserving Biometric Information Anonymization.

17. IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications.

18. Causal effect analysis-based intrusion detection system for IoT applications.

19. Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning.

20. Applying NLP techniques to malware detection in a practical environment.

21. Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network.

22. Attribute inference privacy protection for pre-trained models.

23. Random forest evaluation using multi-key homomorphic encryption and lookup tables.

24. A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things.

25. A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection.

26. Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning.

27. Security bug reports classification using fasttext.

28. Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT.

29. Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems.

30. Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection.

31. Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining.

32. HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN.

33. A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media.

34. Deep learning based network intrusion detection system: a systematic literature review and future scopes.

35. MAPAS: a practical deep learning-based android malware detection system.

36. IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core.

37. DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour.

38. AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph.

39. Defeating traffic analysis via differential privacy: a case study on streaming traffic.

40. Evaluating differentially private decision tree model over model inversion attack.

41. The Agent Web Model: modeling web hacking for reinforcement learning.

42. An SSH predictive model using machine learning with web proxy session logs.

43. A semantic-aware log generation method for network activities.

44. Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow.

45. Forensic investigation of the dark web on the Tor network: pathway toward the surface web.

46. RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment.

47. Blockchain-based multi-diagnosis deep learning application for various diseases classification.

48. CADS-ML/DL: efficient cloud-based multi-attack detection system.

49. On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs.

50. Effective network intrusion detection using stacking-based ensemble approach.