Showing 1–16 of 16 results
/ Date/ Name
Jun 1, 2021MalPhase: Fine-Grained Malware Detection Using Network Flow DataApr 23, 2025MAYA: Addressing Inconsistencies in Generative Password Guessing through a Unified BenchmarkMar 20, 2024Have You Poisoned My Data? Defending Neural Networks against Data PoisoningMay 13, 2021PassFlow: Guessing Passwords with Generative FlowsAug 16, 2016Know Your Enemy: Stealth Configuration-Information Gathering in SDNJun 25, 2025BotHash: Efficient and Training-Free Bot Detection Through Approximate Nearest NeighborJan 26, 2023Minerva: A File-Based Ransomware DetectorMar 31, 2021Reliable Detection of Compressed and Encrypted DataMar 6, 2024Do You Trust Your Model? Emerging Malware Threats in the Deep Learning EcosystemMar 1, 2023OliVaR: Improving Olive Variety Recognition using Deep Neural NetworksOct 15, 2020EnCoD: Distinguishing Compressed and Encrypted File FragmentsMar 1, 2023DOLOS: A Novel Architecture for Moving Target DefenseNov 6, 2019The Naked Sun: Malicious Cooperation Between Benign-Looking ProcessesSep 27, 2024Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future ProspectsFeb 8, 2015LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS AttacksMar 28, 2018Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0