Journal: IEEE Intelligent Systems

Volume 33, Issue 2

3 -- 4Nathalie Japkowicz, Yuval Elovici. Introduction to the Special Issue on Data Mining for Cybersecurity
5 -- 18Jordan Noble, Niall M. Adams. Real-Time Dynamic Network Anomaly Detection
19 -- 28Paulo Henrique Pisani, Ana Carolina Lorena, André C. P. L. F. Carvalho. Adaptive Biometric Systems using Ensembles
29 -- 39Aunshul Rege, Zoran Obradovic, Nima Asadi, Edward Parker, Rohan Pandit, Nicholas Masceri, Brian Singer. Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive Neural Networks
40 -- 53Edita Grolman, Andrey Finkelshtein, Rami Puzis, Asaf Shabtai, Gershon Celniker, Ziv Katzir, Liron Rosenfeld. Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis
54 -- 62Adrian Taylor, Sylvain Leblanc, Nathalie Japkowicz. Probing the Limits of Anomaly Detectors for Automobiles with a Cyberattack Framework
63 -- 73Sagar Samtani, Shuo Yu, Hongyi Zhu, Mark W. Patton, John Matherly, Hsinchun Chen. Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach
74 -- 82James Paulin, Anisoara Calinescu, Michael Wooldridge. Agent-Based Modeling for Complex Financial Systems
83 -- 88Gary Klein. Explaining Explanation, Part 3: The Causal Landscape