A survey on hardware-based malware detection approaches Authors: Cristiano Pegoraro Chenet, Alessandro Savino, Stefano Di Carlo | Published: 2023-03-22 | Updated: 2024-04-18 Challenges of HPCCybersecurityMachine Learning Technology 2023.03.22 2025.05.28 Literature Database
DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness Authors: Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras | Published: 2023-03-20 | Updated: 2023-10-03 CybersecurityMembership InferenceMachine Learning Technology 2023.03.20 2025.05.28 Literature Database
A Survey on Explainable Artificial Intelligence for Cybersecurity Authors: Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, Rabeb Mizouni, Alyssa Song, Robin Cohen, Hadi Otrok, Azzam Mourad | Published: 2023-03-07 | Updated: 2023-06-11 XAI (Explainable AI)CybersecurityExplainability 2023.03.07 2025.05.28 Literature Database
COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso | Published: 2022-08-25 | Updated: 2023-11-27 CybersecurityPrivacy ViolationUser Activity Analysis 2022.08.25 2025.05.28 Literature Database
Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study Authors: Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo | Published: 2022-08-25 CybersecurityAttack DetectionMachine Learning 2022.08.25 2025.05.28 Literature Database
Deception for Cyber Defence: Challenges and Opportunities Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar | Published: 2022-08-15 CybersecurityAttack MethodMachine Learning Technology 2022.08.15 2025.05.28 Literature Database
The Dangers of Computational Law and Cybersecurity; Perspectives from Engineering and the AI Act Authors: Kaspar Rosager Ludvigsen, Shishir Nagaraja, Angela Daly | Published: 2022-07-01 CybersecurityRisk ManagementArtificial Intelligence Regulation 2022.07.01 2025.05.28 Literature Database
Symbolic analysis meets federated learning to enhance malware identifier Authors: Khanh Huu The Dam, Charles-Henry Bertrand Van Ouytsel, Axel Legay | Published: 2022-04-29 CybersecuritySecure AggregationMalware Propagation Means 2022.04.29 2025.05.28 Literature Database
TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection Authors: Sijia Li, Gaopeng Gou, Chang Liu, Chengshang Hou, Zhenzhen Li, Gang Xiong | Published: 2022-04-28 CybersecurityNetwork Node ConfigurationPhishing Attack 2022.04.28 2025.05.28 Literature Database
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework Authors: Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti | Published: 2022-04-27 CybersecurityPhishing AttackAttack Method 2022.04.27 2025.05.28 Literature Database