UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI Authors: Aly Sabri Abdalla, Ali Behfarnia, Vuk Marojevic | Published: 2023-06-11 | Updated: 2023-06-13 UAV SecuritySelection and Evaluation of Optimization AlgorithmsCommunication Model 2023.06.11 2025.05.28 Literature Database
Zero-Day Threats Detection for Critical Infrastructures Authors: Mike Nkongolo, Mahmut Tokmak | Published: 2023-06-10 Random ForestAttack MethodStatistical Methods 2023.06.10 2025.05.28 Literature Database
Differentially private sliced inverse regression in the federated paradigm Authors: Shuaida He, Jiarui Zhang, Xin Chen | Published: 2023-06-10 | Updated: 2023-08-10 Sample ComplexityPrivacy Enhancing TechnologyFederated Learning 2023.06.10 2025.05.28 Literature Database
Early Malware Detection and Next-Action Prediction Authors: Zahra Jamadi, Amir G. Aghdam | Published: 2023-06-09 LSTM Model Performance EvaluationCyber AttackClassification of Malicious Actors 2023.06.09 2025.05.28 Literature Database
A Survey on Cross-Architectural IoT Malware Threat Hunting Authors: Anandharaju Durai Raju, Ibrahim Abualhaol, Ronnie Salvador Giagone, Yang Zhou, Shengqiang Huang | Published: 2023-06-09 ELF File FormatMalware Propagation MeansResource Scarcity Issues 2023.06.09 2025.05.28 Literature Database
Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions Authors: Ezgi Korkmaz, Jonah Brown-Cohen | Published: 2023-06-09 Attack MethodAdversarial TrainingBehavior Analysis Method 2023.06.09 2025.05.28 Literature Database
DETECTA: Investigación de metodologías no intrusivas apoyadas en tecnologías habilitadoras 4.0 para abordar un mantenimiento predictivo y ciberseguro en pymes industriales Authors: Alvaro García, Alejandro Echeverría, José Félix Ovejero | Published: 2023-06-09 WatermarkingCyber AttackDigital Twin 2023.06.09 2025.05.28 Literature Database
JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection Authors: Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura | Published: 2023-06-09 Dataset GenerationModel Performance EvaluationMalicious Website Detection 2023.06.09 2025.05.28 Literature Database
Intrusion Detection Systems for Flying Ad-hoc Networks Authors: Jordan Quinn, Safdar Hussain Bouk | Published: 2023-06-08 Energy ManagementNetwork Threat DetectionVulnerability detection 2023.06.08 2025.05.28 Literature Database
Prompt Injection attack against LLM-integrated Applications Authors: Yi Liu, Gelei Deng, Yuekang Li, Kailong Wang, Zihao Wang, Xiaofeng Wang, Tianwei Zhang, Yepang Liu, Haoyu Wang, Yan Zheng, Yang Liu | Published: 2023-06-08 | Updated: 2024-03-02 Prompt InjectionMalicious Prompt 2023.06.08 2025.05.28 Literature Database