Literature Database

On the Resilience of Machine Learning-Based IDS for Automotive Networks

Authors: Ivo Zenden, Han Wang, Alfonso Iacovazzi, Arash Vahidi, Rolf Blom, Shahid Raza | Published: 2023-06-26
Malware Detection Method
Adversarial Attack Methods
Vehicle Network

Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers

Authors: Alfonso Iacovazzi, Shahid Raza | Published: 2023-06-26
Dataset Generation
Data Collection
Malware Detection Method

PWSHAP: A Path-Wise Explanation Model for Targeted Variables

Authors: Lucile Ter-Minassian, Oscar Clivio, Karla Diaz-Ordaz, Robin J. Evans, Chris Holmes | Published: 2023-06-26
Robustness Evaluation
Causal Interpretation
Local Mediation Effect

ChatIDS: Explainable Cybersecurity Using Generative AI

Authors: Victor Jüttner, Martin Grimmer, Erik Buchmann | Published: 2023-06-26
Online Safety Advice
Prompt Injection
Expert Opinion Collection

Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices

Authors: Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Merouane Debbah, Thierry Lestable, Narinderjit Singh Thandi | Published: 2023-06-25 | Updated: 2024-02-08
Malware Detection Method
Feature Extraction Method
Natural Language Processing

Steganographic Capacity of Deep Learning Models

Authors: Lei Zhang, Dong Li, Olha Jurečková, Mark Stamp | Published: 2023-06-25
Data Obfuscation
Malware Classification
Information Hiding Techniques

Locally Differentially Private Distributed Online Learning with Guaranteed Optimality

Authors: Ziqin Chen, Yongqiang Wang | Published: 2023-06-25 | Updated: 2024-08-23
Algorithm Design
Privacy Protection
Convergence Guarantee

Federated Learning Approach for Distributed Ransomware Analysis

Authors: Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno | Published: 2023-06-25
Malware Classification
Malware Detection Method
Federated Learning

On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions

Authors: Reza Fayyazi, Shanchieh Jay Yang | Published: 2023-06-24 | Updated: 2023-08-22
Prompt Injection
Malware Classification
Natural Language Processing

Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks

Authors: Pranav Dahiya, Ilia Shumailov, Ross Anderson | Published: 2023-06-24 | Updated: 2024-02-10
Algorithm Design
Adversarial attack
Statistical Testing