Cyber Attack

Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning

Authors: Mounia Hamidouche, Eugeny Popko, Bassem Ouni | Published: 2023-11-20
IoT Device Identification
Cyber Attack
Deep Learning Method

An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures

Authors: Tanmay Singla, Dharun Anandayuvaraj, Kelechi G. Kalu, Taylor R. Schorlemmer, James C. Davis | Published: 2023-08-09
Cyber Attack
Prompt Injection
Model Performance Evaluation

Different Mechanisms of Machine Learning and Optimization Algorithms Utilized in Intrusion Detection Systems

Authors: Mohammad Aziz, Ali Saeed Alfoudi | Published: 2023-08-08
Cyber Attack
Machine Learning Technology

Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums

Authors: Felipe Moreno-Vera, Mateus Nogueira, Cainã Figueiredo, Daniel Sadoc Menasché, Miguel Bicudo, Ashton Woiwood, Enrico Lovat, Anton Kocheturov, Leandro Pfleger de Aguiar | Published: 2023-08-03
Cyber Attack
Data Collection
Vulnerability Management

A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities

Authors: Suman Maiti, Anjana B, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey | Published: 2023-06-15
Cyber Attack
Attack Graph Generation
Threat modeling

Early Malware Detection and Next-Action Prediction

Authors: Zahra Jamadi, Amir G. Aghdam | Published: 2023-06-09
LSTM Model Performance Evaluation
Cyber Attack
Classification of Malicious Actors

DETECTA: Investigación de metodologías no intrusivas apoyadas en tecnologías habilitadoras 4.0 para abordar un mantenimiento predictivo y ciberseguro en pymes industriales

Authors: Alvaro García, Alejandro Echeverría, José Félix Ovejero | Published: 2023-06-09
Watermarking
Cyber Attack
Digital Twin

Building Resilient SMEs: Harnessing Large Language Models for Cyber Security in Australia

Authors: Benjamin Kereopa-Yorke | Published: 2023-06-05
LLM Application
Cyber Attack
Compliance with Ethical Guidelines

CyPhERS: A Cyber-Physical Event Reasoning System providing real-time situational awareness for attack and fault response

Authors: Nils Müller, Kaibin Bao, Jörg Matthes, Kai Heussen | Published: 2023-05-26
Control Model of CPS
Cyber Attack
Anomaly Detection Method

DNN-Defender: A Victim-Focused In-DRAM Defense Mechanism for Taming Adversarial Weight Attack on DNNs

Authors: Ranyang Zhou, Sabbir Ahmed, Adnan Siraj Rakin, Shaahin Angizi | Published: 2023-05-14 | Updated: 2024-09-10
DNN IP Protection Method
DRAM Defense Method
Cyber Attack