Cybersecurity

Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection

Authors: Marc Schmitt | Published: 2023-10-15
Cybersecurity
Network Threat Detection
Machine Learning Method

Balancing Transparency and Risk: The Security and Privacy Risks of Open-Source Machine Learning Models

Authors: Dominik Hintersdorf, Lukas Struppek, Kristian Kersting | Published: 2023-08-18
AI Compliance
Cybersecurity
Data Privacy Assessment

S3C2 Summit 2023-06: Government Secure Supply Chain Summit

Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams | Published: 2023-08-13
SBOM Practices
Cybersecurity
Security Assurance

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks

Authors: Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash | Published: 2023-07-30
Cybersecurity
Adversarial Spectrum Attack Detection
Watermark Robustness

The GANfather: Controllable generation of malicious activity to improve defence systems

Authors: Ricardo Ribeiro Pereira, Jacopo Bono, João Tiago Ascensão, David Aparício, Pedro Ribeiro, Pedro Bizarro | Published: 2023-07-25
Cybersecurity
Data Generation
Classification of Malicious Actors

Malware Resistant Data Protection in Hyper-connected Networks: A survey

Authors: Jannatul Ferdous, Rafiqul Islam, Maumita Bhattacharya, Md Zahidul Islam | Published: 2023-07-24
Cybersecurity
Malware Propagation Means
Classification of Malicious Actors

On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities

Authors: Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone, Huang Shengqiang | Published: 2023-06-12
Role of MLSecOps
Cybersecurity
Malware Detection

SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

Authors: Giovanni Apruzzese, Pavel Laskov, Johannes Schneider | Published: 2023-04-30
Cybersecurity
Adversarial Attack Methods
Operational Scenario

A survey on hardware-based malware detection approaches

Authors: Cristiano Pegoraro Chenet, Alessandro Savino, Stefano Di Carlo | Published: 2023-03-22 | Updated: 2024-04-18
Challenges of HPC
Cybersecurity
Machine Learning Technology

DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness

Authors: Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras | Published: 2023-03-20 | Updated: 2023-10-03
Cybersecurity
Membership Inference
Machine Learning Technology