S3C2 Summit 2023-06: Government Secure Supply Chain Summit Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams | Published: 2023-08-13 SBOM PracticesCybersecuritySecurity Assurance 2023.08.13 2025.05.28 Literature Database
Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks Authors: Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash | Published: 2023-07-30 CybersecurityAdversarial Spectrum Attack DetectionWatermark Robustness 2023.07.30 2025.05.28 Literature Database
The GANfather: Controllable generation of malicious activity to improve defence systems Authors: Ricardo Ribeiro Pereira, Jacopo Bono, João Tiago Ascensão, David Aparício, Pedro Ribeiro, Pedro Bizarro | Published: 2023-07-25 CybersecurityData GenerationClassification of Malicious Actors 2023.07.25 2025.05.28 Literature Database
Malware Resistant Data Protection in Hyper-connected Networks: A survey Authors: Jannatul Ferdous, Rafiqul Islam, Maumita Bhattacharya, Md Zahidul Islam | Published: 2023-07-24 CybersecurityMalware Propagation MeansClassification of Malicious Actors 2023.07.24 2025.05.28 Literature Database
On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities Authors: Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone, Huang Shengqiang | Published: 2023-06-12 Role of MLSecOpsCybersecurityMalware Detection 2023.06.12 2025.05.28 Literature Database
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection Authors: Giovanni Apruzzese, Pavel Laskov, Johannes Schneider | Published: 2023-04-30 CybersecurityAdversarial Attack MethodsOperational Scenario 2023.04.30 2025.05.28 Literature Database
A survey on hardware-based malware detection approaches Authors: Cristiano Pegoraro Chenet, Alessandro Savino, Stefano Di Carlo | Published: 2023-03-22 | Updated: 2024-04-18 Challenges of HPCCybersecurityMachine Learning Technology 2023.03.22 2025.05.28 Literature Database
DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness Authors: Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras | Published: 2023-03-20 | Updated: 2023-10-03 CybersecurityMembership InferenceMachine Learning Technology 2023.03.20 2025.05.28 Literature Database
A Survey on Explainable Artificial Intelligence for Cybersecurity Authors: Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, Rabeb Mizouni, Alyssa Song, Robin Cohen, Hadi Otrok, Azzam Mourad | Published: 2023-03-07 | Updated: 2023-06-11 XAI (Explainable AI)CybersecurityExplainability 2023.03.07 2025.05.28 Literature Database
COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso | Published: 2022-08-25 | Updated: 2023-11-27 CybersecurityPrivacy ViolationUser Activity Analysis 2022.08.25 2025.05.28 Literature Database