Search

Showing total 204 results

Search Constraints

Start Over You searched for: Topic machine learning Remove constraint Topic: machine learning Journal international journal of information security Remove constraint Journal: international journal of information security
204 results

Search Results

1. A review on graph-based approaches for network security monitoring and botnet detection.

2. Early web application attack detection using network traffic analysis.

3. From zero-shot machine learning to zero-day attack detection.

4. BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks.

5. Securing MQTT protocol for IoT environment using IDS based on ensemble learning.

6. Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities.

7. Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware.

8. Defense against membership inference attack in graph neural networks through graph perturbation.

10. Malware classification approaches utilizing binary and text encoding of permissions.

11. Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.

12. cFEM: a cluster based feature extraction method for network intrusion detection.

13. A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes.

14. Swarm-intelligence for the modern ICT ecosystems

17. Model-Agnostic Utility-Preserving Biometric Information Anonymization.

19. Causal effect analysis-based intrusion detection system for IoT applications.

20. Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning.

21. Applying NLP techniques to malware detection in a practical environment.

25. Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network.

26. Attribute inference privacy protection for pre-trained models.

27. Random forest evaluation using multi-key homomorphic encryption and lookup tables.

28. A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things.

29. A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection.

30. Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning.

31. Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection.

32. Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining.

33. HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN.

34. A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media.

35. Deep learning based network intrusion detection system: a systematic literature review and future scopes.

36. MAPAS: a practical deep learning-based android malware detection system.

37. IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core.

38. A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information.

40. DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation.

41. AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph.

42. Defeating traffic analysis via differential privacy: a case study on streaming traffic.

43. Evaluating differentially private decision tree model over model inversion attack.

44. The Agent Web Model: modeling web hacking for reinforcement learning.

45. An SSH predictive model using machine learning with web proxy session logs.

46. A semantic-aware log generation method for network activities.

47. Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow.

49. Supervised machine learning using encrypted training data.

50. A formalization of card-based cryptographic protocols via abstract machine.