The METRIC-framework for assessing data quality for trustworthy AI in medicine: a systematic review

D Schwabe, K Becker, M Seyferth, A Klaß… - NPJ Digital …, 2024 - nature.com
The adoption of machine learning (ML) and, more specifically, deep learning (DL)
applications into all major areas of our lives is underway. The development of trustworthy AI …

Machine learning for detecting data exfiltration: A review

B Sabir, F Ullah, MA Babar, R Gaire - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Context: Research at the intersection of cybersecurity, Machine Learning (ML), and Software
Engineering (SE) has recently taken significant steps in proposing countermeasures for …

The role of machine learning in cybersecurity

G Apruzzese, P Laskov, E Montes de Oca… - … Threats: Research and …, 2023 - dl.acm.org
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …

Helphed: Hybrid ensemble learning phishing email detection

P Bountakas, C Xenakis - Journal of network and computer applications, 2023 - Elsevier
Phishing email attack is a dominant cyber-criminal strategy for decades. Despite its
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …

The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?

F Teichmann, SR Boticiu, BS Sergi - International Cybersecurity Law …, 2023 - Springer
This article aims to analyze the current unpredictable cyber climate. In particular, Russia's
invasion of Ukraine has heightened concerns about security incidents, and ransomware …

SoK: The impact of unlabelled data in cyberthreat detection

G Apruzzese, P Laskov… - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
Machine learning (ML) has become an important paradigm for cyberthreat detection (CTD)
in the recent years. A substantial research effort has been invested in the development of …

Combining long-term recurrent convolutional and graph convolutional networks to detect phishing sites using URL and HTML

S Ariyadasa, S Fernando, S Fernando - IEEE Access, 2022 - ieeexplore.ieee.org
Phishing, a well-known cyber-attack practice has gained significant research attention in the
cyber-security domain for the last two decades due to its dynamic attacking strategies …

Malware detection with artificial intelligence: A systematic literature review

MG Gaber, M Ahmed, H Janicke - ACM Computing Surveys, 2024 - dl.acm.org
In this survey, we review the key developments in the field of malware detection using AI and
analyze core challenges. We systematically survey state-of-the-art methods across five …

A comparison of natural language processing and machine learning methods for phishing email detection

P Bountakas, K Koutroumpouchos… - Proceedings of the 16th …, 2021 - dl.acm.org
Phishing is the most-used malicious attempt in which attackers, commonly via emails,
impersonate trusted persons or entities to obtain private information from a victim. Even …

Analyzing fusion of regularization techniques in the deep learning‐based intrusion detection system

A Thakkar, R Lohiya - International Journal of Intelligent …, 2021 - Wiley Online Library
The surge of constantly evolving network attacks can be addressed by designing an
effective and efficient Intrusion Detection System (IDS). Various Deep Learning (DL) …