AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation Authors: Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde | Published: 2023-10-04 Data GenerationThreat modelingevaluation metrics 2023.10.04 2025.05.28 Literature Database
Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection Authors: Bibek Bhattarai, H. Howie Huang | Published: 2023-10-02 WatermarkingSecurity AnalysisThreat modeling 2023.10.02 2025.05.28 Literature Database
Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense Authors: Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán | Published: 2023-07-21 | Updated: 2023-12-09 Secure Communication ChannelPoisoningThreat modeling 2023.07.21 2025.05.28 Literature Database
A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks Authors: Umara Noor, Sawera Shahid, Rimsha Kanwal, Zahid Rashid | Published: 2023-07-17 Dataset GenerationMachine Learning TechnologyThreat modeling 2023.07.17 2025.05.28 Literature Database
Robust Ranking Explanations Authors: Chao Chen, Chenghua Guo, Guixiang Ma, Ming Zeng, Xi Zhang, Sihong Xie | Published: 2023-07-08 Robustness EvaluationThreat modelingExplainability 2023.07.08 2025.05.28 Literature Database
Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives Authors: Danele Lunghi, Alkis Simitsis, Olivier Caelen, Gianluca Bontempi | Published: 2023-07-03 Adversarial ExampleAdversarial attackThreat modeling 2023.07.03 2025.05.28 Literature Database
MLSMM: Machine Learning Security Maturity Model Authors: Felix Jedrzejewski, Davide Fucci, Oleksandr Adamov | Published: 2023-06-28 AI ComplianceSecurity labelThreat modeling 2023.06.28 2025.05.28 Literature Database
Developing and Deploying Security Applications for In-Vehicle Networks Authors: Samuel C Hollifield, Pablo Moriano, William L Lambert, Joel Asiamah, Isaac Sikkema, Michael D Iannacone | Published: 2023-06-27 MicrocontrollerThreat modelingVehicle Network 2023.06.27 2025.05.28 Literature Database
An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices Authors: Vitalina Holubenko, Paulo Silva, Carlos Bento | Published: 2023-06-23 Performance EvaluationThreat modelingFederated Learning 2023.06.23 2025.05.28 Literature Database
Do you still need a manual smart contract audit? Authors: Isaac David, Liyi Zhou, Kaihua Qin, Dawn Song, Lorenzo Cavallaro, Arthur Gervais | Published: 2023-06-21 | Updated: 2023-06-22 Smart ContractProgram AnalysisThreat modeling 2023.06.21 2025.05.28 Literature Database