Search

Showing total 59 results

Search Constraints

Start Over You searched for: Topic machine learning Remove constraint Topic: machine learning Journal international journal of information security Remove constraint Journal: international journal of information security Publisher springer nature Remove constraint Publisher: springer nature
59 results

Search Results

1. Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities.

2. A review on graph-based approaches for network security monitoring and botnet detection.

3. Attribute inference privacy protection for pre-trained models.

4. Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network.

5. Random forest evaluation using multi-key homomorphic encryption and lookup tables.

6. A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things.

7. A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection.

8. Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning.

9. Security bug reports classification using fasttext.

10. Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT.

11. Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems.

12. BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks.

13. Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware.

14. Securing MQTT protocol for IoT environment using IDS based on ensemble learning.

15. From zero-shot machine learning to zero-day attack detection.

16. DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour.

17. Malware classification approaches utilizing binary and text encoding of permissions.

18. Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.

19. AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph.

20. cFEM: a cluster based feature extraction method for network intrusion detection.

21. A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes.

22. Malicious website identification using design attribute learning.

23. Early web application attack detection using network traffic analysis.

24. Causal effect analysis-based intrusion detection system for IoT applications.

25. Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning.

26. Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection.

27. Defense against membership inference attack in graph neural networks through graph perturbation.

28. Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining.

29. HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN.

30. Applying NLP techniques to malware detection in a practical environment.

31. A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media.

32. IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core.

33. MAPAS: a practical deep learning-based android malware detection system.

34. Swarm-intelligence for the modern ICT ecosystems.

35. A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications.

36. IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications.

37. Defeating traffic analysis via differential privacy: a case study on streaming traffic.

38. Evaluating differentially private decision tree model over model inversion attack.

39. An SSH predictive model using machine learning with web proxy session logs.

40. Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow.

41. The Agent Web Model: modeling web hacking for reinforcement learning.

42. A semantic-aware log generation method for network activities.

43. DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation.

44. Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications.

45. NSDroid: efficient multi-classification of android malware using neighborhood signature in local function call graphs.

46. Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing.

47. A study of IoT malware activities using association rule learning for darknet sensor data.

48. A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information.

49. Improved yoking proof protocols for preserving anonymity.

50. Supervised machine learning using encrypted training data.