Jasmine: A New Active Learning Approach to Combat Cybercrime Aug 13, 2021 Active Learning Intrusion Detection
— Unverified 0Joint Semantic Transfer Network for IoT Intrusion Detection Oct 28, 2022 Computational Efficiency Domain Adaptation
— Unverified 0Kernel density estimation based sampling for imbalanced class distribution Oct 17, 2019 Density Estimation Fraud Detection
— Unverified 0Keystroke Patterns as Prosody in Digital Writings: A Case Study with Deceptive Reviews and Essays Oct 1, 2014 Deception Detection Intrusion Detection
— Unverified 0KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation May 26, 2024 Anomaly Detection Generative Adversarial Network
— Unverified 0KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data Oct 10, 2024 Anomaly Detection Fraud Detection
— Unverified 0KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs Jun 24, 2025 Intrusion Detection Knowledge Graphs
— Unverified 0Large Language Models for Cyber Security: A Systematic Literature Review May 8, 2024 Explainable Models Intrusion Detection
— Unverified 0Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection May 17, 2024 In-Context Learning Intrusion Detection
— Unverified 0Late Breaking Results: Scalable and Efficient Hyperdimensional Computing for Network Intrusion Detection Apr 11, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT Apr 26, 2021 BIG-bench Machine Learning Intrusion Detection
— Unverified 0LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks Jun 23, 2022 Intrusion Detection Network Intrusion Detection
— Unverified 0Learning automata based SVM for intrusion detection Jan 4, 2018 Dimensionality Reduction Intrusion Detection
— Unverified 0Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters Sep 19, 2023 Intrusion Detection
— Unverified 0Learning detectors of malicious web requests for intrusion detection in network traffic Feb 8, 2017 Intrusion Detection
— Unverified 0Learning in Multiple Spaces: Few-Shot Network Attack Detection with Metric-Fused Prototypical Networks Dec 28, 2024 Intrusion Detection Network Intrusion Detection
— Unverified 0Learning Privately from Multiparty Data Feb 10, 2016 Activity Recognition Intrusion Detection
— Unverified 0Learning to Detect: A Data-driven Approach for Network Intrusion Detection Aug 18, 2021 Intrusion Detection Network Intrusion Detection
— Unverified 0Learning With Differential Privacy Jun 10, 2020 Intrusion Detection
— Unverified 0LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems Apr 20, 2024 Computational Efficiency Feature Engineering
— Unverified 0LENS-XAI: Redefining Lightweight and Explainable Network Security through Knowledge Distillation and Variational Autoencoders for Scalable Intrusion Detection in Cybersecurity Jan 1, 2025 Computational Efficiency Intrusion Detection
— Unverified 0Leveraging Planning Landmarks for Hybrid Online Goal Recognition Jan 25, 2023 Intrusion Detection
— Unverified 0Leveraging Siamese Networks for One-Shot Intrusion Detection Model Jun 27, 2020 Anomaly Detection Intrusion Detection
— Unverified 0LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G Oct 6, 2022 Intrusion Detection
— Unverified 0LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems Nov 6, 2016 Computer Security Intrusion Detection
— Unverified 0LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach Sep 23, 2021 Intrusion Detection Language Modeling
— Unverified 0Machine Learning Applications in Misuse and Anomaly Detection Sep 10, 2020 Anomaly Detection BIG-bench Machine Learning
— Unverified 0Machine Learning Approach for Detection of nonTor Traffic Aug 29, 2017 BIG-bench Machine Learning Intrusion Detection
— Unverified 0Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security Oct 1, 2024 Intrusion Detection
— Unverified 0Machine Learning-based Android Intrusion Detection System Dec 5, 2024 Intrusion Detection
— Unverified 0Machine Learning based Anomaly Detection for 5G Networks Mar 7, 2020 Anomaly Detection BIG-bench Machine Learning
— Unverified 0Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction Jul 4, 2023 feature selection Intrusion Detection
— Unverified 0Machine Learning-Based Intrusion Detection and Prevention System for IIoT Smart Metering Networks: Challenges and Solutions Feb 16, 2025 Decision Making Intrusion Detection
— Unverified 0Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction Jan 22, 2024 Blocking Dimensionality Reduction
— Unverified 0Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things Nov 13, 2019 Anomaly Detection BIG-bench Machine Learning
— Unverified 0Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats Apr 7, 2022 Intrusion Detection
— Unverified 0Machine Learning for Anomaly Detection and Categorization in Multi-cloud Environments Oct 23, 2018 Anomaly Detection BIG-bench Machine Learning
— Unverified 0Machine Learning for Intrusion Detection in Industrial Control Systems: Applications, Challenges, and Recommendations Feb 24, 2022 Anomaly Detection BIG-bench Machine Learning
— Unverified 0Machine Learning Techniques for Intrusion Detection Dec 8, 2013 BIG-bench Machine Learning Intrusion Detection
— Unverified 0Manifold regularization based on Nyström type subsampling Oct 13, 2017 image-classification Image Classification
— Unverified 0Man-in-the-Middle Intrusion Detection Based on CNN-LSTM Model Jul 17, 2023 Intrusion Detection
— Unverified 0Many Field Packet Classification with Decomposition and Reinforcement Learning May 16, 2022 Classification Deep Reinforcement Learning
— Unverified 0Mapping the Landscape of Generative AI in Network Monitoring and Management Feb 12, 2025 Intrusion Detection Management
— Unverified 0Mimic Learning to Generate a Shareable Network Intrusion Detection Model May 2, 2019 Intrusion Detection Network Intrusion Detection
— Unverified 0MKF-ADS: Multi-Knowledge Fusion Based Self-supervised Anomaly Detection System for Control Area Network Mar 7, 2024 Anomaly Detection Intrusion Detection
— Unverified 0MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek in WSNs Feb 17, 2024 Intrusion Detection
— Unverified 0Model Selection for Anomaly Detection Jul 12, 2017 Anomaly Detection Classification
— Unverified 0Modern Cybersecurity Solution using Supervised Machine Learning Sep 15, 2021 BIG-bench Machine Learning Intrusion Detection
— Unverified 0Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection May 15, 2019 Intrusion Detection
— Unverified 0More Efficient Topic Modelling Through a Noun Only Approach Dec 1, 2015 Intrusion Detection Sentiment Analysis
— Unverified 0