Literature Database

UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI

Authors: Aly Sabri Abdalla, Ali Behfarnia, Vuk Marojevic | Published: 2023-06-11 | Updated: 2023-06-13
UAV Security
Selection and Evaluation of Optimization Algorithms
Communication Model

Zero-Day Threats Detection for Critical Infrastructures

Authors: Mike Nkongolo, Mahmut Tokmak | Published: 2023-06-10
Random Forest
Attack Method
Statistical Methods

Differentially private sliced inverse regression in the federated paradigm

Authors: Shuaida He, Jiarui Zhang, Xin Chen | Published: 2023-06-10 | Updated: 2023-08-10
Sample Complexity
Privacy Enhancing Technology
Federated Learning

Early Malware Detection and Next-Action Prediction

Authors: Zahra Jamadi, Amir G. Aghdam | Published: 2023-06-09
LSTM Model Performance Evaluation
Cyber Attack
Classification of Malicious Actors

A Survey on Cross-Architectural IoT Malware Threat Hunting

Authors: Anandharaju Durai Raju, Ibrahim Abualhaol, Ronnie Salvador Giagone, Yang Zhou, Shengqiang Huang | Published: 2023-06-09
ELF File Format
Malware Propagation Means
Resource Scarcity Issues

Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions

Authors: Ezgi Korkmaz, Jonah Brown-Cohen | Published: 2023-06-09
Attack Method
Adversarial Training
Behavior Analysis Method

DETECTA: Investigación de metodologías no intrusivas apoyadas en tecnologías habilitadoras 4.0 para abordar un mantenimiento predictivo y ciberseguro en pymes industriales

Authors: Alvaro García, Alejandro Echeverría, José Félix Ovejero | Published: 2023-06-09
Watermarking
Cyber Attack
Digital Twin

JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection

Authors: Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura | Published: 2023-06-09
Dataset Generation
Model Performance Evaluation
Malicious Website Detection

Intrusion Detection Systems for Flying Ad-hoc Networks

Authors: Jordan Quinn, Safdar Hussain Bouk | Published: 2023-06-08
Energy Management
Network Threat Detection
Vulnerability detection

Prompt Injection attack against LLM-integrated Applications

Authors: Yi Liu, Gelei Deng, Yuekang Li, Kailong Wang, Zihao Wang, Xiaofeng Wang, Tianwei Zhang, Yepang Liu, Haoyu Wang, Yan Zheng, Yang Liu | Published: 2023-06-08 | Updated: 2024-03-02
Prompt Injection
Malicious Prompt