Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier Authors: Anupama Mishra | Published: 2022-04-27 CybersecurityModel DesignAttack Method 2022.04.27 2025.05.28 Literature Database
ARLIF-IDS — Attention augmented Real-Time Isolation Forest Intrusion Detection System Authors: Aman Priyanshu, Sarthak Shastri, Sai Sravan Medicherla | Published: 2022-04-20 CybersecurityIntrusion Detection SystemAttention Mechanism 2022.04.20 2025.05.28 Literature Database
An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment Authors: Ömer Sen, Dennis van der Velde, Sebastian N. Peters, Martin Henze | Published: 2021-10-05 Energy ManagementCybersecurityOperational Scenario 2021.10.05 2025.05.28 Literature Database
Automating Privilege Escalation with Deep Reinforcement Learning Authors: Kalle Kujanpää, Willie Victor, Alexander Ilin | Published: 2021-10-04 CybersecurityDeep Reinforcement LearningPrivilege Escalation 2021.10.04 2025.05.28 Literature Database
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert | Published: 2021-09-20 | Updated: 2022-06-08 AlgorithmCybersecurityData Leakage 2021.09.20 2025.05.28 Literature Database
A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14 CybersecurityData Extraction and AnalysisMachine Learning Application 2021.09.14 2025.05.28 Literature Database
What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams | Published: 2021-09-14 CybersecurityData Extraction and AnalysisProactive Defense 2021.09.14 2025.05.28 Literature Database
Social Media Monitoring for IoT Cyber-Threats Authors: Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou | Published: 2021-09-09 AlgorithmCybersecurityVulnerability Management 2021.09.09 2025.05.28 Literature Database
Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems Authors: Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai | Published: 2021-07-05 | Updated: 2021-10-03 CybersecurityMembership InferenceThreat modeling 2021.07.05 2025.05.28 Literature Database
Segmented Federated Learning for Adaptive Intrusion Detection System Authors: Geet Shingi, Harsh Saglani, Preeti Jain | Published: 2021-07-02 CybersecurityMachine Learning MethodFederated Learning 2021.07.02 2025.05.28 Literature Database