Cybersecurity

Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study

Authors: Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo | Published: 2022-08-25
Cybersecurity
Attack Detection
Machine Learning

Deception for Cyber Defence: Challenges and Opportunities

Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar | Published: 2022-08-15
Cybersecurity
Attack Method
Machine Learning Technology

The Dangers of Computational Law and Cybersecurity; Perspectives from Engineering and the AI Act

Authors: Kaspar Rosager Ludvigsen, Shishir Nagaraja, Angela Daly | Published: 2022-07-01
Cybersecurity
Risk Management
Artificial Intelligence Regulation

Symbolic analysis meets federated learning to enhance malware identifier

Authors: Khanh Huu The Dam, Charles-Henry Bertrand Van Ouytsel, Axel Legay | Published: 2022-04-29
Cybersecurity
Secure Aggregation
Malware Propagation Means

TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection

Authors: Sijia Li, Gaopeng Gou, Chang Liu, Chengshang Hou, Zhenzhen Li, Gang Xiong | Published: 2022-04-28
Cybersecurity
Network Node Configuration
Phishing Attack

An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

Authors: Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti | Published: 2022-04-27
Cybersecurity
Phishing Attack
Attack Method

Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier

Authors: Anupama Mishra | Published: 2022-04-27
Cybersecurity
Model Design
Attack Method

ARLIF-IDS — Attention augmented Real-Time Isolation Forest Intrusion Detection System

Authors: Aman Priyanshu, Sarthak Shastri, Sai Sravan Medicherla | Published: 2022-04-20
Cybersecurity
Intrusion Detection System
Attention Mechanism

An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment

Authors: Ömer Sen, Dennis van der Velde, Sebastian N. Peters, Martin Henze | Published: 2021-10-05
Energy Management
Cybersecurity
Operational Scenario

Automating Privilege Escalation with Deep Reinforcement Learning

Authors: Kalle Kujanpää, Willie Victor, Alexander Ilin | Published: 2021-10-04
Cybersecurity
Deep Reinforcement Learning
Privilege Escalation