Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features Aug 28, 2017 Intrusion Detection Malware Detection
Code Code Available 0Novel Sensor Scheduling Scheme for Intruder Tracking in Energy Efficient Sensor Networks Aug 27, 2017 Intrusion Detection Reinforcement Learning
— Unverified 0Accelerating Dependency Graph Learning from Heterogeneous Categorical Event Streams via Knowledge Transfer Aug 25, 2017 Graph Learning Intrusion Detection
— Unverified 0Energy-based Models for Video Anomaly Detection Aug 17, 2017 Anomaly Detection Feature Engineering
— Unverified 0Model Selection for Anomaly Detection Jul 12, 2017 Anomaly Detection Classification
— Unverified 0A Machine Learning Based Intrusion Detection System for Software Defined 5G Network Jul 10, 2017 BIG-bench Machine Learning Intrusion Detection
— Unverified 0Hybrid Isolation Forest - Application to Intrusion Detection May 10, 2017 Anomaly Detection Computational Efficiency
Code Code Available 0Data Mining model in the discovery of trends and patterns of intruder attacks on the data network as a public-sector innovation Apr 19, 2017 Intrusion Detection Network Intrusion Detection
— Unverified 0Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System Apr 7, 2017 General Classification Intrusion Detection
— Unverified 0Collective Anomaly Detection based on Long Short Term Memory Recurrent Neural Network Mar 28, 2017 Anomaly Detection Intrusion Detection
— Unverified 0eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys Feb 27, 2017 BIG-bench Machine Learning Intrusion Detection
Code Code Available 0On the (Statistical) Detection of Adversarial Examples Feb 21, 2017 Intrusion Detection Malware Classification
— Unverified 0Learning detectors of malicious web requests for intrusion detection in network traffic Feb 8, 2017 Intrusion Detection
— Unverified 0Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey Jan 9, 2017 BIG-bench Machine Learning feature selection
— Unverified 0SoK: Applying Machine Learning in Security - A Survey Nov 10, 2016 BIG-bench Machine Learning Intrusion Detection
— Unverified 0LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems Nov 6, 2016 Computer Security Intrusion Detection
— Unverified 0"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law Sep 14, 2016 Intrusion Detection Network Intrusion Detection
— Unverified 0Conformalized density- and distance-based anomaly detection in time-series data Aug 16, 2016 Anomaly Detection Intrusion Detection
— Unverified 0Attribute Learning for Network Intrusion Detection Jul 28, 2016 Attribute Intrusion Detection
— Unverified 0Sorting out typicality with the inverse moment matrix SOS polynomial Jun 13, 2016 Intrusion Detection Network Intrusion Detection
— Unverified 0Bidirectional RNN for Medical Event Detection in Electronic Health Records Jun 1, 2016 Event Detection Intrusion Detection
— Unverified 0Detecting Novel Processes with CANDIES -- An Holistic Novelty Detection Technique based on Probabilistic Models May 18, 2016 Intrusion Detection Novelty Detection
— Unverified 0Learning Privately from Multiparty Data Feb 10, 2016 Activity Recognition Intrusion Detection
— Unverified 0Multi-centrality Graph Spectral Decompositions and their Application to Cyber Intrusion Detection Dec 23, 2015 Dictionary Learning Intrusion Detection
— Unverified 0More Efficient Topic Modelling Through a Noun Only Approach Dec 1, 2015 Intrusion Detection Sentiment Analysis
— Unverified 0Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System Sep 28, 2015 General Classification Intrusion Detection
— Unverified 0Detecting Clusters of Anomalies on Low-Dimensional Feature Subsets with Application to Network Traffic Flow Data Jun 10, 2015 Anomaly Detection Group Anomaly Detection
— Unverified 0Extreme bandits Dec 1, 2014 Intrusion Detection Network Intrusion Detection
— Unverified 0Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection Oct 28, 2014 Anomaly Detection BIG-bench Machine Learning
— Unverified 0Keystroke Patterns as Prosody in Digital Writings: A Case Study with Deceptive Reviews and Essays Oct 1, 2014 Deception Detection Intrusion Detection
— Unverified 0Efficient classification using parallel and scalable compressed model and Its application on intrusion detection May 14, 2014 Attribute Classification
— Unverified 0A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm May 3, 2014 Classification General Classification
— Unverified 0A New Clustering Approach for Anomaly Intrusion Detection Apr 10, 2014 Clustering Intrusion Detection
— Unverified 0Relevant Feature Selection Model Using Data Mining for Intrusion Detection System Mar 30, 2014 feature selection Intrusion Detection
— Unverified 0Continuous Features Discretization for Anomaly Intrusion Detectors Generation Mar 7, 2014 Intrusion Detection
— Unverified 0Security Evaluation of Support Vector Machines in Adversarial Environments Jan 30, 2014 Intrusion Detection Malware Detection
— Unverified 0Toward Supervised Anomaly Detection Jan 23, 2014 Active Learning Anomaly Detection
— Unverified 0An Identification System Using Eye Detection Based On Wavelets And Neural Networks Jan 20, 2014 Intrusion Detection
— Unverified 0Intrusion Detection using Continuous Time Bayesian Networks Jan 16, 2014 Anomaly Detection Intrusion Detection
— Unverified 0A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents Dec 31, 2013 Intrusion Detection
— Unverified 0Two Timescale Convergent Q-learning for Sleep--Scheduling in Wireless Sensor Networks Dec 27, 2013 feature selection Intrusion Detection
— Unverified 0Machine Learning Techniques for Intrusion Detection Dec 8, 2013 BIG-bench Machine Learning Intrusion Detection
— Unverified 0A Review of Machine Learning based Anomaly Detection Techniques Jul 27, 2013 Anomaly Detection BIG-bench Machine Learning
— Unverified 0The Dendritic Cell Algorithm for Intrusion Detection May 31, 2013 Intrusion Detection
— Unverified 0Immune System Approaches to Intrusion Detection - A Review (ICARIS) May 30, 2013 Computer Security Intrusion Detection
— Unverified 0A SVM and K-means clustering based fast and efficient intrusion detection system May 6, 2013 Clustering Intrusion Detection
— Unverified 0Predicting Network Attacks Using Ontology-Driven Inference Apr 3, 2013 Intrusion Detection Management
— Unverified 0Fast Feature Reduction in intrusion detection datasets Apr 1, 2013 feature selection Intrusion Detection
— Unverified 0A survey on deep packet inspection for intrusion detection systems Mar 1, 2008 Intrusion Detection Survey
— Unverified 0Intrusion Detection Systems Using Adaptive Regression Splines May 5, 2004 Intrusion Detection regression
— Unverified 0