Security Analysis

Is there a Trojan! : Literature survey and critical evaluation of the latest ML based modern intrusion detection systems in IoT environments

Authors: Vishal Karanam | Published: 2023-06-14
Security Analysis
Model Performance Evaluation
Machine Learning Technology

Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features

Authors: Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, Muhyun Kim, Feng Chen, Murat Kantarcioglu, Kangkook Jee | Published: 2023-06-01 | Updated: 2025-09-22
Security Analysis
Malware Detection Scenario
評価メトリクス

Measuring and Modeling the Free Content Web

Authors: Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, and David Mohaisen | Published: 2023-04-26
Website Vulnerability
Security Analysis
Vulnerability Analysis

A Security Verification Framework of Cryptographic Protocols Using Machine Learning

Authors: Kentaro Ohno, Misato Nakabayashi | Published: 2023-04-26
Security Analysis
Training Protocol
Prototype Network

SQLi Detection with ML: A data-source perspective

Authors: Balazs Pejo, Nikolett Kapui | Published: 2023-04-24
Website Vulnerability
Security Analysis
Intrusion Detection System

QuMoS: A Framework for Preserving Security of Quantum Machine Learning Model

Authors: Zhepeng Wang, Jinyang Li, Zhirui Hu, Blake Gage, Elizabeth Iwasawa, Weiwen Jiang | Published: 2023-04-23 | Updated: 2023-10-13
Security Analysis
Optimization Methods
Quantization and Privacy

How Secure is Code Generated by ChatGPT?

Authors: Raphaël Khoury, Anderson R. Avila, Jacob Brunelle, Baba Mamadou Camara | Published: 2023-04-19
Security Analysis
Program Verification
Vulnerability Prediction

AI Product Security: A Primer for Developers

Authors: Ebenezer R. H. P. Isaac, Jim Reno | Published: 2023-04-18
Security Analysis
Privacy Technique
Compliance with Ethical Guidelines

Crossing Roads of Federated Learning and Smart Grids: Overview, Challenges, and Perspectives

Authors: Hafsa Bousbiat, Roumaysa Bousselidj, Yassine Himeur, Abbes Amira, Faycal Bensaali, Fodil Fadli, Wathiq Mansoor, Wilfried Elmenreich | Published: 2023-04-17
Energy-Based Model
Security Analysis
Privacy Technique

Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses

Authors: Ashraf Haddad, Najwa Aaraj, Preslav Nakov, Septimiu Fabian Mare | Published: 2023-04-13
Security Analysis
Dataset Generation
Natural Language Processing