Cybersecurity

Towards Improving the Trustworthiness of Hardware based Malware Detector using Online Uncertainty Estimation

Authors: Harshit Kumar, Nikhil Chawla, Saibal Mukhopadhyay | Published: 2021-03-21
Cybersecurity
Data Dependency
Quantification of Uncertainty

Explaining Network Intrusion Detection System Using Explainable AI Framework

Authors: Shraddha Mane, Dattaraj Rao | Published: 2021-03-12
Cybersecurity
Model Architecture
Deep Learning Technology

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey

Authors: Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles Kamhoua, Munindar P. Singh | Published: 2021-01-21 | Updated: 2021-05-08
Game Theory
Cybersecurity
Defensive Deception

Machine Learning in Generation, Detection, and Mitigation of Cyberattacks in Smart Grid: A Survey

Authors: Nur Imtiazul Haque, Md Hasan Shahriar, Md Golam Dastgir, Anjan Debnath, Imtiaz Parvez, Arif Sarwat, Mohammad Ashiqur Rahman | Published: 2020-09-01
FDI Attack Detection Methods
Cybersecurity
Deep Learning Technology

SynGAN: Towards Generating Synthetic Network Attacks using GANs

Authors: Jeremy Charlier, Aman Singh, Gaston Ormazabal, Radu State, Henning Schulzrinne | Published: 2019-08-26
DDoS Attack
Cybersecurity
Framework

Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking

Authors: Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei | Published: 2019-05-27 | Updated: 2019-05-30
Cybersecurity
Tracking Method
Adversarial Attack Methods

Devil in the Detail: Attack Scenarios in Industrial Applications

Authors: Simon D. Duque Anton, Alexander Hafner, Hans Dieter Schotten | Published: 2019-05-24
Cybersecurity
Process Environment
Attack Type

Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection

Authors: Simon D. Duque Anton, Mathias Strufe, Hans Dieter Schotten | Published: 2019-05-15 | Updated: 2019-05-16
Challenges in IT Security
Cybersecurity
Intrusion Detection System

Anomaly Detection in Cyber Network Data Using a Cyber Language Approach

Authors: Bartley D. Richardson, Benjamin J. Radford, Shawn E. Davis, Keegan Hines, David Pekarek | Published: 2018-08-15
Cybersecurity
Dataset evaluation
Traffic Characteristic Analysis

Detection based Defense against Adversarial Examples from the Steganalysis Point of View

Authors: Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha, Nenghai Yu | Published: 2018-06-21 | Updated: 2018-12-24
Cybersecurity
Adversarial Example Detection
Adversarial Training