Cyber Attack

Spear Phishing With Large Language Models

Authors: Julian Hazell | Published: 2023-05-11 | Updated: 2023-12-22
Cyber Attack
Phishing Attack
Prompt Injection

SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems

Authors: Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, Selcuk Uluagac, Laurent Njilla | Published: 2023-04-27
Cyber Attack
Scheduling Method
Anomaly Detection Method

Network Cascade Vulnerability using Constrained Bayesian Optimization

Authors: Albert Lam, Mihai Anitescu, Anirudh Subramanyam | Published: 2023-04-27 | Updated: 2023-10-05
Cyber Attack
Hyperparameter Tuning
Attack Method

ANALYSE — Learning to Attack Cyber-Physical Energy Systems With Intelligent Agents

Authors: Thomas Wolgast, Nils Wenninghoff, Stephan Balduin, Eric Veith, Bastian Fraune, Torben Woltjen, Astrid Nieße | Published: 2023-04-21
Cyber Attack
Reinforcement Learning
Attack Scenario Analysis

Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification

Authors: Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang | Published: 2023-04-04
Cyber Attack
Privacy Enhancing Technology
Attack Method

Chatbots in a Honeypot World

Authors: Forrest McKee, David Noever | Published: 2023-01-10
Cyber Attack
Honeypot Technology
Program Analysis

A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System

Authors: Zong-Zhi Lin, Thomas D. Pike, Mark M. Bailey, Nathaniel D. Bastian | Published: 2022-11-08 | Updated: 2024-09-06
Cyber Attack
Model Selection
Improvement of Learning

A White-Box Adversarial Attack Against a Digital Twin

Authors: Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi | Published: 2022-10-25
Cyber Attack
Adversarial Training
Anomaly Detection Method

Understanding the Limits of Poisoning Attacks in Episodic Reinforcement Learning

Authors: Anshuka Rangi, Haifeng Xu, Long Tran-Thanh, Massimo Franceschetti | Published: 2022-08-29
Cyber Attack
Reward Mechanism Design
Optimization Problem

Phishing Detection Leveraging Machine Learning and Deep Learning: A Review

Authors: Dinil Mon Divakaran, Adam Oest | Published: 2022-05-16
Web Page Content Analysis
Cyber Attack
Phishing Detection