Data Collection

Risk factor aggregation and stress testing

Authors: Natalie Packham | Published: 2023-10-06
Clustering methods
Data Collection
Machine Learning Method

Threat Trekker: An Approach to Cyber Threat Hunting

Authors: Ángel Casanova Bienzobas, Alfonso Sánchez-Macián | Published: 2023-10-06
Class Imbalance
Data Collection
Machine Learning Method

Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To!

Authors: Xiangyu Qi, Yi Zeng, Tinghao Xie, Pin-Yu Chen, Ruoxi Jia, Prateek Mittal, Peter Henderson | Published: 2023-10-05
Data Collection
Prompt Injection
Information Gathering Methods

The Anatomy of Deception: Technical and Human Perspectives on a Large-scale Phishing Campaign

Authors: Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis | Published: 2023-10-05
Data Collection
User Activity Analysis
Victim Statistics

Beyond Labeling Oracles: What does it mean to steal ML models?

Authors: Avital Shafran, Ilia Shumailov, Murat A. Erdogdu, Nicolas Papernot | Published: 2023-10-03 | Updated: 2024-06-13
Data Collection
Knowledge Extraction Method
evaluation metrics

A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums

Authors: Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci | Published: 2023-08-18
Data Collection
Model Performance Evaluation
Machine Learning Technology

PURL: Safe and Effective Sanitization of Link Decoration

Authors: Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby | Published: 2023-08-07 | Updated: 2024-03-06
Watermarking
Data Protection Method
Data Collection

Privacy Preserving In-memory Computing Engine

Authors: Haoran Geng, Jianqiao Mo, Dayane Reis, Jonathan Takeshita, Taeho Jung, Brandon Reagen, Michael Niemier, Xiaobo Sharon Hu | Published: 2023-08-04 | Updated: 2023-08-10
Data Protection Method
Data Collection
Machine Learning Method

Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums

Authors: Felipe Moreno-Vera, Mateus Nogueira, Cainã Figueiredo, Daniel Sadoc Menasché, Miguel Bicudo, Ashton Woiwood, Enrico Lovat, Anton Kocheturov, Leandro Pfleger de Aguiar | Published: 2023-08-03
Cyber Attack
Data Collection
Vulnerability Management

Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti | Published: 2023-06-28
IoC Analysis Method
Data Collection
evaluation metrics