ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2012.09344
  4. Cited By
Machine Learning for Detecting Data Exfiltration: A Review
v1v2 (latest)

Machine Learning for Detecting Data Exfiltration: A Review

ACM Computing Surveys (ACM CSUR), 2020
17 December 2020
Bushra Sabir
Faheem Ullah
M. Babar
R. Gaire
    AAML
ArXiv (abs)PDFHTML

Papers citing "Machine Learning for Detecting Data Exfiltration: A Review"

7 / 7 papers shown
Security Analysis and Threat Modeling of Research Management Applications [Extended Version]
Security Analysis and Threat Modeling of Research Management Applications [Extended Version]SoutheastCon (SoutheastCon), 2025
Boniface M. Sindala
Ragib Hasan
125
0
0
03 Oct 2025
Detecting Misuse of Security APIs: A Systematic Review
Detecting Misuse of Security APIs: A Systematic ReviewACM Computing Surveys (ACM Comput. Surv.), 2023
Zahra Mousavi
Chadni Islam
Muhammad Ali Babar
A. Abuadbba
Kristen Moore
353
21
0
15 Jun 2023
Machine Learning for Software Engineering: A Tertiary Study
Machine Learning for Software Engineering: A Tertiary StudyACM Computing Surveys (ACM CSUR), 2022
Zoe Kotti
R. Galanopoulou
D. Spinellis
191
37
0
17 Nov 2022
SmartValidator: A Framework for Automatic Identification and
  Classification of Cyber Threat Data
SmartValidator: A Framework for Automatic Identification and Classification of Cyber Threat DataJournal of Network and Computer Applications (JNCA), 2022
Chadni Islam
Muhammad Ali Babar
Roland Croft
Helge Janicke
215
28
0
15 Mar 2022
A Survey on DNS Encryption: Current Development, Malware Misuse, and
  Inference Techniques
A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference TechniquesACM Computing Surveys (ACM CSUR), 2022
Minzhao Lyu
Hassan Habibi Gharakheili
V. Sivaraman
207
72
0
03 Jan 2022
A Survey on Data-driven Software Vulnerability Assessment and
  Prioritization
A Survey on Data-driven Software Vulnerability Assessment and PrioritizationACM Computing Surveys (CSUR), 2021
T. H. Le
Huaming Chen
Muhammad Ali Babar
557
121
0
18 Jul 2021
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and
  Countermeasures
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and CountermeasuresACM Computing Surveys (CSUR), 2021
Hussain Ahmad
I. Dharmadasa
Faheem Ullah
M. Babar
426
33
0
24 Apr 2021
1
Page 1 of 1