Showing 1–19 of 19 results
/ Date/ Name
Feb 27, 2025DIN-CTS: Low-Complexity Depthwise-Inception Neural Network with Contrastive Training Strategy for Deepfake Speech DetectionMar 4, 2025Trace of the Times: Rootkit Detection through Temporal Anomalies in Kernel ActivityMar 4, 2026CAM-LDS: Cyber Attack Manifestations for Automatic Interpretation of System Logs and Security AlertsJan 18, 2021Applying High-Performance Bioinformatics Tools for Outlier Detection in Log DataJul 8, 2022Deep Learning for Anomaly Detection in Log Data: A SurveyFeb 12, 2026Resource-Aware Deployment Optimization for Collaborative Intrusion Detection in Layered NetworksApr 13, 2026Beyond RAG for Cyber Threat Intelligence: A Systematic Evaluation of Graph-Based and Agentic RetrievalMar 16, 2022Maintainable Log Datasets for Evaluation of Intrusion Detection SystemsAug 28, 2024Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary EmulationAug 24, 2023Introducing a New Alert Data Set for Multi-Step Attack AnalysisNov 21, 2025StealthCup: Realistic, Multi-Stage, Evasion-Focused CTF for Benchmarking IDSJan 20, 2025Towards Improving IDS Using CTF EventsSep 23, 2024A Comprehensive Survey with Critical Analysis for Deepfake Speech DetectionApr 7, 2025System Log Parsing with Large Language Models: A ReviewNov 16, 2012Towards a Layered Architectural View for Security Analysis in SCADA SystemsSep 6, 2023A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection TechniquesJan 20, 2026AttackMate: Realistic Emulation and Automation of Cyber Attack Scenarios Across the Kill ChainFeb 6, 2026AlertBERT: A noise-robust alert grouping framework for simultaneous cyber attacksSep 27, 1999Elastic Compton scattering from the deuteron and nucleon polarizabilities