User behavior analysis for detecting compromised user Accounts: A review paper
The rise of online transactions has led to a corresponding increase in online criminal
activities. Account takeover attacks, in particular, are challenging to detect, and novel …
activities. Account takeover attacks, in particular, are challenging to detect, and novel …
[HTML][HTML] Unsupervised Anomaly Detection and Explanation in Network Traffic with Transformers
Deep learning-based autoencoders represent a promising technology for use in network-
based attack detection systems. They offer significant benefits in managing unknown …
based attack detection systems. They offer significant benefits in managing unknown …
Low-cost orthogonal basis-core extraction for classification and reconstruction using tensor ring
Tensor based methods have gained popularity for being able to represent multi-aspect real
world data in a lower dimensional space. Among them, methods with orthogonal factors …
world data in a lower dimensional space. Among them, methods with orthogonal factors …
Distributed out-of-memory NMF on CPU/GPU architectures
We propose an efficient distributed out-of-memory implementation of the non-negative
matrix factorization (NMF) algorithm for heterogeneous high-performance-computing …
matrix factorization (NMF) algorithm for heterogeneous high-performance-computing …
Electrical Grid Anomaly Detection via Tensor Decomposition
Supervisory Control and Data Acquisition (SCADA) systems often serve as the nervous
system for substations within power grids. These systems facilitate real-time monitoring, data …
system for substations within power grids. These systems facilitate real-time monitoring, data …
Advanced Semi-Supervised Tensor Decomposition Methods for Malware Characterization
ME Eren - 2024 - search.proquest.com
Malware continues to be one of the most dangerous and costly cyber threats to national
security. As of last year, over 1.3 billion malware specimens have been documented …
security. As of last year, over 1.3 billion malware specimens have been documented …
[PDF][PDF] Malware Antivirus Scan Pattern Mining via Tensor Decomposition
P Bhandary, C Vieson, A Kiendrebeogo… - Malware Technical …, 2022 - maksimeren.com
Accurate labeling is important for detecting malware and building reference datasets which
can be used for evaluating machine learning (ML) based malware classification and …
can be used for evaluating machine learning (ML) based malware classification and …
Unsupervised learning from textual data with neural text representations
MA Saada - 2023 - theses.hal.science
The digital era generates enormous amounts of unstructured data such as images and
documents, requiring specific processing methods to extract value from them. Textual data …
documents, requiring specific processing methods to extract value from them. Textual data …
A Holistic review and performance evaluation of unsupervised learning methods for network anomaly detection
The evolving cyber-attack landscape demands flexible and precise protection for information
and networks. Network anomaly detection (NAD) systems play a crucial role in preventing …
and networks. Network anomaly detection (NAD) systems play a crucial role in preventing …
[PDF][PDF] Inductive Lateral Movement Detection in Enterprise Computer Networks
C Larroche - esann.org
Lateral movement is a crucial phase of advanced cyberattacks, during which attackers
propagate from host to host within the targeted network. State-of-the-art methods for …
propagate from host to host within the targeted network. State-of-the-art methods for …