Advanced Security Threat Modelling for Blockchain-Based FinTech Applications Authors: Serhan W. Bahar | Published: 2023-04-05 Security AnalysisThreat modelingVulnerability Mitigation Technique 2023.04.05 2025.05.28 Literature Database
A Multiagent CyberBattleSim for RL Cyber Operation Agents Authors: Thomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, Li Li | Published: 2023-04-03 Security AnalysisNetwork Threat DetectionEducational CTF 2023.04.03 2025.05.28 Literature Database
Graph Mining for Cybersecurity: A Survey Authors: Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du | Published: 2023-04-02 | Updated: 2023-10-16 Graph EmbeddingGraph ConstructionSecurity Analysis 2023.04.02 2025.05.28 Literature Database
Extracted BERT Model Leaks More Information than You Think! Authors: Xuanli He, Chen Chen, Lingjuan Lyu, Qiongkai Xu | Published: 2022-10-21 | Updated: 2022-10-31 Security AnalysisPrivacy Risk ManagementMembership Inference 2022.10.21 2025.05.28 Literature Database
A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends Authors: Yao Zhao, Youyang Qu, Yong Xiang, Md Palash Uddin, Dezhong Peng, Longxiang Gao | Published: 2022-10-20 | Updated: 2024-08-07 Security AnalysisPrivacy Risk ManagementComputational Efficiency 2022.10.20 2025.05.28 Literature Database
Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2 Authors: Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti | Published: 2022-10-17 | Updated: 2023-04-30 Security AnalysisData Privacy AssessmentPrivacy Risk Management 2022.10.17 2025.05.28 Literature Database
New Secure Sparse Inner Product with Applications to Machine Learning Authors: Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu | Published: 2022-10-16 Security AnalysisCryptographyComputational Efficiency 2022.10.16 2025.05.28 Literature Database
Classification of Web Phishing Kits for early detection by platform providers Authors: Andrea Venturi, Michele Colajanni, Marco Ramilli, Giorgio Valenziano Santangelo | Published: 2022-10-15 Security AnalysisMalicious Website DetectionMachine Learning Technology 2022.10.15 2025.05.28 Literature Database
IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge Authors: Hidetoshi Kawaguchi, Yuichi Nakatani, Shogo Okada | Published: 2022-07-19 Security AnalysisExpert Opinion CollectionFeature Importance Analysis 2022.07.19 2025.05.28 Literature Database
Security and Safety Aspects of AI in Industry Applications Authors: Hans Dermot Doran | Published: 2022-07-16 Security AnalysisTraining ProtocolModel Architecture 2022.07.16 2025.05.28 Literature Database