Discussion on Protocol Vulnerabilities and Attack Scenarios

ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction

Authors: Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh | Published: 2019-12-05
Privacy Enhancing Protocol
Discussion on Protocol Vulnerabilities and Attack Scenarios
Performance Evaluation

Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

Authors: Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain | Published: 2019-11-13
Backdoor Attack
Discussion on Protocol Vulnerabilities and Attack Scenarios
Attacker Behavior Analysis

Advanced Analytics for Connected Cars Cyber Security

Authors: Matan Levi, Yair Allouche, Aryeh Kontorovich | Published: 2017-11-06 | Updated: 2017-11-08
HMM Model Generation
ML-Based IDS
Discussion on Protocol Vulnerabilities and Attack Scenarios