Cybersecurity

An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment

Authors: Ömer Sen, Dennis van der Velde, Sebastian N. Peters, Martin Henze | Published: 2021-10-05
Energy Management
Cybersecurity
Operational Scenario

Automating Privilege Escalation with Deep Reinforcement Learning

Authors: Kalle Kujanpää, Willie Victor, Alexander Ilin | Published: 2021-10-04
Cybersecurity
Deep Reinforcement Learning
Privilege Escalation

Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS

Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert | Published: 2021-09-20 | Updated: 2022-06-08
Algorithm
Cybersecurity
Data Leakage

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14
Cybersecurity
Data Extraction and Analysis
Machine Learning Application

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey

Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams | Published: 2021-09-14
Cybersecurity
Data Extraction and Analysis
Proactive Defense

Social Media Monitoring for IoT Cyber-Threats

Authors: Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou | Published: 2021-09-09
Algorithm
Cybersecurity
Vulnerability Management

Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems

Authors: Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai | Published: 2021-07-05 | Updated: 2021-10-03
Cybersecurity
Membership Inference
Threat modeling

Segmented Federated Learning for Adaptive Intrusion Detection System

Authors: Geet Shingi, Harsh Saglani, Preeti Jain | Published: 2021-07-02
Cybersecurity
Machine Learning Method
Federated Learning

Towards Improving the Trustworthiness of Hardware based Malware Detector using Online Uncertainty Estimation

Authors: Harshit Kumar, Nikhil Chawla, Saibal Mukhopadhyay | Published: 2021-03-21
Cybersecurity
Data Dependency
Quantification of Uncertainty

Explaining Network Intrusion Detection System Using Explainable AI Framework

Authors: Shraddha Mane, Dattaraj Rao | Published: 2021-03-12
Cybersecurity
Model Architecture
Deep Learning Technology