Cybersecurity

Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus

Authors: William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas | Published: 2018-06-12
Cybersecurity
Taxonomy of Attacks
Adversarial Learning

An Efficient Flow-based Multi-level Hybrid Intrusion Detection System for Software-Defined Networks

Authors: Majd Latah, Levent Toker | Published: 2018-06-11
FDI Attack Detection Methods
Cybersecurity
Taxonomy of Attacks

Discovering Signals from Web Sources to Predict Cyber Attacks

Authors: Palash Goyal, KSM Tozammel Hossain, Ashok Deb, Nazgol Tavabi, Nathan Bartley, Andr'es Abeliuk, Emilio Ferrara, Kristina Lerman | Published: 2018-06-08
Cybersecurity
Information Gathering Methods
Vulnerability Prediction

A Study of EV BMS Cyber Security Based on Neural Network SOC Prediction

Authors: Syed Rahman, Haneen Aburub, Yemeserach Mekonnen, Arif I. Sarwat | Published: 2018-06-07
Cybersecurity
Climate Information
Watermark Evaluation

Set-based Obfuscation for Strong PUFs against Machine Learning Attacks

Authors: Jiliang Zhang, Chaoqun Shen | Published: 2018-06-06 | Updated: 2019-11-13
Cybersecurity
User Authentication System
Watermark Evaluation

Android Malware Detection based on Factorization Machine

Authors: Chenglin Li, Keith Mills, Rui Zhu, Di Niu, Hongwen Zhang, Husam Kinawi | Published: 2018-05-30 | Updated: 2019-08-13
Cybersecurity
Feature Importance Analysis
Watermark Evaluation

Secure Mobile Edge Computing in IoT via Collaborative Online Learning

Authors: Bingcong Li, Tianyi Chen, Georgios B. Giannakis | Published: 2018-05-09
Cybersecurity
Information Security
Attack Detection

Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices

Authors: Daniel Hahn, Noah Apthorpe, Nick Feamster | Published: 2018-05-07
Cybersecurity
Information Security
Deep Learning Model

Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach

Authors: Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanacek | Published: 2018-05-07 | Updated: 2018-12-12
Cybersecurity
Attack Detection
Robustness of Watermarking Techniques

What we learn from learning – Understanding capabilities and limitations of machine learning in botnet attacks

Authors: David Santana, Shan Suthaharan, Somya Mohanty | Published: 2018-05-03
Cybersecurity
Botnet Traffic
Attack Method