Cybersecurity

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey

Authors: Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles Kamhoua, Munindar P. Singh | Published: 2021-01-21 | Updated: 2021-05-08
Game Theory
Cybersecurity
Defensive Deception

Machine Learning in Generation, Detection, and Mitigation of Cyberattacks in Smart Grid: A Survey

Authors: Nur Imtiazul Haque, Md Hasan Shahriar, Md Golam Dastgir, Anjan Debnath, Imtiaz Parvez, Arif Sarwat, Mohammad Ashiqur Rahman | Published: 2020-09-01
FDI Attack Detection Methods
Cybersecurity
Deep Learning Technology

SynGAN: Towards Generating Synthetic Network Attacks using GANs

Authors: Jeremy Charlier, Aman Singh, Gaston Ormazabal, Radu State, Henning Schulzrinne | Published: 2019-08-26
DDoS Attack
Cybersecurity
Framework

Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking

Authors: Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei | Published: 2019-05-27 | Updated: 2019-05-30
Cybersecurity
Tracking Method
Adversarial Attack Methods

Devil in the Detail: Attack Scenarios in Industrial Applications

Authors: Simon D. Duque Anton, Alexander Hafner, Hans Dieter Schotten | Published: 2019-05-24
Cybersecurity
Process Environment
Attack Type

Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection

Authors: Simon D. Duque Anton, Mathias Strufe, Hans Dieter Schotten | Published: 2019-05-15 | Updated: 2019-05-16
Challenges in IT Security
Cybersecurity
Intrusion Detection System

Anomaly Detection in Cyber Network Data Using a Cyber Language Approach

Authors: Bartley D. Richardson, Benjamin J. Radford, Shawn E. Davis, Keegan Hines, David Pekarek | Published: 2018-08-15
Cybersecurity
Dataset evaluation
Traffic Characteristic Analysis

Detection based Defense against Adversarial Examples from the Steganalysis Point of View

Authors: Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha, Nenghai Yu | Published: 2018-06-21 | Updated: 2018-12-24
Cybersecurity
Adversarial Example Detection
Adversarial Training

Effect of Hyper-Parameter Optimization on the Deep Learning Model Proposed for Distributed Attack Detection in Internet of Things Environment

Authors: Md Mohaimenuzzaman, Zahraa Said Abdallah, Joarder Kamruzzaman, Bala Srinivasan | Published: 2018-06-19
Cybersecurity
Deep Learning Technology

Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work

Authors: Somdip Dey | Published: 2018-06-14
Cybersecurity
Fraudulent Transaction
Taxonomy of Attacks