Automation of Cybersecurity

Data-Driven Intelligence can Revolutionize Today’s Cybersecurity World: A Position Paper

Authors: Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, Seyit Camtepe | Published: 2023-08-09
AI Compliance
Automation of Cybersecurity
Data Management System

Machine-learned Adversarial Attacks against Fault Prediction Systems in Smart Electrical Grids

Authors: Carmelo Ardito, Yashar Deldjoo, Tommaso Di Noia, Eugenio Di Sciascio, Fatemeh Nazary, Giovanni Servedio | Published: 2023-03-28 | Updated: 2024-01-30
Automation of Cybersecurity
Adversarial Example
Machine Learning Technology

Machine Learning and Port Scans: A Systematic Review

Authors: Jason M. Pittman | Published: 2023-01-31
Automation of Cybersecurity
Data Collection
Vulnerability detection

Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence

Authors: Elijah Pelofske, Lorie M. Liebrock, Vincent Urias | Published: 2023-01-27 | Updated: 2024-10-07
Automation of Cybersecurity
Information Gathering Methods
Vulnerability Management

Color Teams for Machine Learning Development

Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-10-20
Automation of Cybersecurity
Data Collection
Machine Learning Framework

A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

Authors: Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya | Published: 2021-10-15
Automation of Cybersecurity
Machine Learning Algorithm
Automated Vulnerability Remediation

Leveraging Sharing Communities to Achieve Federated Learning for Cybersecurity

Authors: Frank W. Bentrem, Michael A. Corsello, Joshua J. Palm | Published: 2021-04-23 | Updated: 2021-04-27
Automation of Cybersecurity
Model Design
Machine Learning Technology

Application Inference using Machine Learning based Side Channel Analysis

Authors: Nikhil Chawla, Arvind Singh, Monodeep Kar, Saibal Mukhopadhyay | Published: 2019-07-09
Automation of Cybersecurity
Data Extraction and Analysis
Machine Learning Framework

Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification

Authors: Ba Dung Le, Guanhua Wang, Mehwish Nasim, Ali Babar | Published: 2019-07-03 | Updated: 2019-09-05
Automation of Cybersecurity
Data Extraction and Analysis
Information Gathering Methods

Deep Reinforcement Learning for Cyber Security

Authors: Thanh Thi Nguyen, Vijay Janapa Reddi | Published: 2019-06-13 | Updated: 2021-11-02
Automation of Cybersecurity
Deep Reinforcement Learning
Defense Method