Cybersecurity

Acoustic Cybersecurity: Exploiting Voice-Activated Systems

Authors: Forrest McKee, David Noever | Published: 2023-11-23
Watermarking
Cybersecurity
Speech Synthesis Technology

Security Challenges in Autonomous Systems Design

Authors: Mohammad Hamad, Sebastian Steinhorst | Published: 2023-11-05 | Updated: 2023-12-04
Cybersecurity
Competitive Cooperative Systems
Automated Response to Attacks in Autonomous Systems

Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection

Authors: Marc Schmitt | Published: 2023-10-15
Cybersecurity
Network Threat Detection
Machine Learning Method

Balancing Transparency and Risk: The Security and Privacy Risks of Open-Source Machine Learning Models

Authors: Dominik Hintersdorf, Lukas Struppek, Kristian Kersting | Published: 2023-08-18
AI Compliance
Cybersecurity
Data Privacy Assessment

S3C2 Summit 2023-06: Government Secure Supply Chain Summit

Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams | Published: 2023-08-13
SBOM Practices
Cybersecurity
Security Assurance

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks

Authors: Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash | Published: 2023-07-30
Cybersecurity
Adversarial Spectrum Attack Detection
Watermark Robustness

The GANfather: Controllable generation of malicious activity to improve defence systems

Authors: Ricardo Ribeiro Pereira, Jacopo Bono, João Tiago Ascensão, David Aparício, Pedro Ribeiro, Pedro Bizarro | Published: 2023-07-25
Cybersecurity
Data Generation
Classification of Malicious Actors

Malware Resistant Data Protection in Hyper-connected Networks: A survey

Authors: Jannatul Ferdous, Rafiqul Islam, Maumita Bhattacharya, Md Zahidul Islam | Published: 2023-07-24
Cybersecurity
Malware Propagation Means
Classification of Malicious Actors

On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities

Authors: Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone, Huang Shengqiang | Published: 2023-06-12
Role of MLSecOps
Cybersecurity
Malware Detection

SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

Authors: Giovanni Apruzzese, Pavel Laskov, Johannes Schneider | Published: 2023-04-30
Cybersecurity
Adversarial Attack Methods
Operational Scenario