An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment Authors: Ömer Sen, Dennis van der Velde, Sebastian N. Peters, Martin Henze | Published: 2021-10-05 Energy ManagementCybersecurityOperational Scenario 2021.10.05 2025.05.28 Literature Database
Automating Privilege Escalation with Deep Reinforcement Learning Authors: Kalle Kujanpää, Willie Victor, Alexander Ilin | Published: 2021-10-04 CybersecurityDeep Reinforcement LearningPrivilege Escalation 2021.10.04 2025.05.28 Literature Database
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert | Published: 2021-09-20 | Updated: 2022-06-08 AlgorithmCybersecurityData Leakage 2021.09.20 2025.05.28 Literature Database
A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14 CybersecurityData Extraction and AnalysisMachine Learning Application 2021.09.14 2025.05.28 Literature Database
What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams | Published: 2021-09-14 CybersecurityData Extraction and AnalysisProactive Defense 2021.09.14 2025.05.28 Literature Database
Social Media Monitoring for IoT Cyber-Threats Authors: Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou | Published: 2021-09-09 AlgorithmCybersecurityVulnerability Management 2021.09.09 2025.05.28 Literature Database
Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems Authors: Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai | Published: 2021-07-05 | Updated: 2021-10-03 CybersecurityMembership InferenceThreat modeling 2021.07.05 2025.05.28 Literature Database
Segmented Federated Learning for Adaptive Intrusion Detection System Authors: Geet Shingi, Harsh Saglani, Preeti Jain | Published: 2021-07-02 CybersecurityMachine Learning MethodFederated Learning 2021.07.02 2025.05.28 Literature Database
Towards Improving the Trustworthiness of Hardware based Malware Detector using Online Uncertainty Estimation Authors: Harshit Kumar, Nikhil Chawla, Saibal Mukhopadhyay | Published: 2021-03-21 CybersecurityData DependencyQuantification of Uncertainty 2021.03.21 2025.05.28 Literature Database
Explaining Network Intrusion Detection System Using Explainable AI Framework Authors: Shraddha Mane, Dattaraj Rao | Published: 2021-03-12 CybersecurityModel ArchitectureDeep Learning Technology 2021.03.12 2025.05.28 Literature Database