Bad Characters: Imperceptible NLP Attacks Authors: Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2021-06-18 | Updated: 2021-12-11 Cyber AttackPrompt InjectionMachine Learning Application 2021.06.18 2025.05.28 Literature Database
Localized Uncertainty Attacks Authors: Ousmane Amadou Dia, Theofanis Karaletsos, Caner Hazirbas, Cristian Canton Ferrer, Ilknur Kaynar Kabul, Erik Meijer | Published: 2021-06-17 Cyber AttackUncertainty EstimationAdversarial Example 2021.06.17 2025.05.28 Literature Database
Intrusion Detection using Machine Learning Techniques: An Experimental Comparison Authors: Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad | Published: 2021-05-27 ML-Based IDSCyber AttackClassification Pattern Analysis 2021.05.27 2025.05.28 Literature Database
MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles Authors: Li Yang, Abdallah Moubayed, Abdallah Shami | Published: 2021-05-26 ML-Based IDSCyber AttackData Preprocessing 2021.05.26 2025.05.28 Literature Database
The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis | Published: 2021-05-25 Cyber AttackCyber ThreatData Collection 2021.05.25 2025.05.28 Literature Database
Advanced Metering Infrastructures: Security Risks and Mitigation Authors: Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles | Published: 2021-05-10 ML-Based IDSCyber AttackVulnerability Management 2021.05.10 2025.05.28 Literature Database
Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey Authors: Vikas Hassija, Vinay Chamola, Adhar Agrawal, Adit Goyal, Nguyen Cong Luong, Dusit Niyato, F. Richard Yu, Mohsen Guizani | Published: 2021-05-04 DoS MitigationCyber AttackDefense Mechanism 2021.05.04 2025.05.28 Literature Database
On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware Authors: Molly Buchanan, Jeffrey W. Collyer, Jack W. Davidson, Saikat Dey, Mark Gardner, Jason D. Hiser, Jeffry Lang, Alastair Nottingham, Alina Oprea | Published: 2021-04-20 | Updated: 2022-05-27 ML-Based IDSCyber AttackData Management System 2021.04.20 2025.05.28 Literature Database
Machine Learning based IoT Edge Node Security Attack and Countermeasures Authors: Vishalini R. Laguduva, Sheikh Ariful Islam, Sathyanarayanan Aakur, Srinivas Katkoori, Robert Karam | Published: 2019-09-17 Cyber AttackSecurity AnalysisMachine Learning Method 2019.09.17 2025.05.28 Literature Database