Cybersecurity

On the Role of Similarity in Detecting Masquerading Files

Authors: Jonathan Oliver, Jue Mo, Susmit Yenkar, Raghav Batta, Sekhar Josyoula | Published: 2024-02-17
Cybersecurity
Integration of Digital Signatures and Machine Learning
Malware Classification

ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System

Authors: Tommaso Puccetti, Simone Nardi, Cosimo Cinquilli, Tommaso Zoppi, Andrea Ceccarelli | Published: 2024-02-13
Cybersecurity
Data Collection
Intrusion Detection System

CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge

Authors: Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Tamas Bisztray, Merouane Debbah | Published: 2024-02-12 | Updated: 2024-06-03
LLM Performance Evaluation
Cybersecurity
Dataset Generation

A Review and Comparison of AI Enhanced Side Channel Analysis

Authors: Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin | Published: 2024-02-03
Watermarking
Cybersecurity
Deep Learning Method

algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms

Authors: Naresh Kshetri, Dilip Kumar, James Hutson, Navneet Kaur, Omar Faruq Osama | Published: 2024-02-01
Algorithm
Website Vulnerability
Cybersecurity

Ransomware threat mitigation through network traffic analysis and machine learning techniques

Authors: Ali Mehrban, Shirin Karimi Geransayeh | Published: 2024-01-27 | Updated: 2024-02-04
Cybersecurity
Ransomware Assessment
Machine Learning Method

Evaluation of LLM Chatbots for OSINT-based Cyber Threat Awareness

Authors: Samaneh Shafee, Alysson Bessani, Pedro M. Ferreira | Published: 2024-01-26 | Updated: 2024-04-19
LLM Performance Evaluation
Cybersecurity
Prompt Injection

Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation

Authors: Mirza Akhi Khatun, Sanober Farheen Memon, Ciarán Eising, Lubna Luxmi Dhirani | Published: 2024-01-17
DDoS Attack
Cybersecurity
Advancements in Medical IoT

A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation

Authors: Zag ElSayed, Nelly Elsayed, Sajjad Bay | Published: 2024-01-14
Cybersecurity
Security Analysis
Advancements in Medical IoT

Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication

Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy | Published: 2024-01-12
Cybersecurity
Security Analysis
Physical layer security