User behavior analysis for detecting compromised user Accounts: A review paper

M Jurišić, I Tomičić, P Grd - Cybernetics and Information Technologies, 2023 - sciendo.com
The rise of online transactions has led to a corresponding increase in online criminal
activities. Account takeover attacks, in particular, are challenging to detect, and novel …

[HTML][HTML] Unsupervised Anomaly Detection and Explanation in Network Traffic with Transformers

A Kummerow, E Abrha, M Eisenbach, D Rösch - Electronics, 2024 - mdpi.com
Deep learning-based autoencoders represent a promising technology for use in network-
based attack detection systems. They offer significant benefits in managing unknown …

Low-cost orthogonal basis-core extraction for classification and reconstruction using tensor ring

S Akhter, MM Alam, MS Islam, MA Momen… - Pattern Recognition, 2024 - Elsevier
Tensor based methods have gained popularity for being able to represent multi-aspect real
world data in a lower dimensional space. Among them, methods with orthogonal factors …

Distributed out-of-memory NMF on CPU/GPU architectures

I Boureima, M Bhattarai, M Eren, E Skau… - The Journal of …, 2024 - Springer
We propose an efficient distributed out-of-memory implementation of the non-negative
matrix factorization (NMF) algorithm for heterogeneous high-performance-computing …

Electrical Grid Anomaly Detection via Tensor Decomposition

AB Most, ME Eren, BS Alexandrov… - MILCOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) systems often serve as the nervous
system for substations within power grids. These systems facilitate real-time monitoring, data …

Advanced Semi-Supervised Tensor Decomposition Methods for Malware Characterization

ME Eren - 2024 - search.proquest.com
Malware continues to be one of the most dangerous and costly cyber threats to national
security. As of last year, over 1.3 billion malware specimens have been documented …

[PDF][PDF] Malware Antivirus Scan Pattern Mining via Tensor Decomposition

P Bhandary, C Vieson, A Kiendrebeogo… - Malware Technical …, 2022 - maksimeren.com
Accurate labeling is important for detecting malware and building reference datasets which
can be used for evaluating machine learning (ML) based malware classification and …

Unsupervised learning from textual data with neural text representations

MA Saada - 2023 - theses.hal.science
The digital era generates enormous amounts of unstructured data such as images and
documents, requiring specific processing methods to extract value from them. Textual data …

A Holistic review and performance evaluation of unsupervised learning methods for network anomaly detection

N Sharma, B Arora, S Ziyad, PK Singh, Y Singh - International Journal on … - sciendo.com
The evolving cyber-attack landscape demands flexible and precise protection for information
and networks. Network anomaly detection (NAD) systems play a crucial role in preventing …

[PDF][PDF] Inductive Lateral Movement Detection in Enterprise Computer Networks

C Larroche - esann.org
Lateral movement is a crucial phase of advanced cyberattacks, during which attackers
propagate from host to host within the targeted network. State-of-the-art methods for …