Cyber Threat

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations

Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák | Published: 2022-06-29
Cyber Threat
Software Security
Vulnerability Management

Spam Detection Using BERT

Authors: Thaer Sahmoud, Mohammad Mikki | Published: 2022-06-06 | Updated: 2022-06-07
Cyber Threat
Spam Detection
Performance Evaluation

Leveraging Machine Learning for Ransomware Detection

Authors: Nanda Rani, Sunita Vikrant Dhavale | Published: 2022-06-04
Cyber Threat
Hybrid Analysis
Dynamic Analysis

Evaluating Automated Driving Planner Robustness against Adversarial Influence

Authors: Andres Molina-Markham, Silvia G. Ionescu, Erin Lanus, Derek Ng, Sam Sommerer, Joseph J. Rushanan | Published: 2022-05-29
Cyber Threat
Trust Evaluation
Vehicle Network

Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor

Authors: Manabu Hirano, Ryotaro Kobayashi | Published: 2022-05-27 | Updated: 2022-08-18
Cyber Threat
Data Management System
Malware Detection Method

A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Predictions

Authors: Yong Xie, Dakuo Wang, Pin-Yu Chen, Jinjun Xiong, Sijia Liu, Sanmi Koyejo | Published: 2022-05-01 | Updated: 2022-07-12
Attack Methods against DFL
Cyber Threat
Attack Type

Adversarial attacks on an optical neural network

Authors: Shuming Jiao, Ziwei Song, Shuiying Xiang | Published: 2022-04-29
Cyber Threat
Attack Type
Image Feature Extraction

Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT

Authors: Joseph Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis | Published: 2021-09-06
ML-Based IDS
Cyber Threat
Malware Detection

Detection of Insider Threats using Artificial Intelligence and Visualisation

Authors: Vasileios Koutsouvelis, Stavros Shiaeles, Bogdan Ghita, Gueltoum Bendiab | Published: 2021-09-06
Cyber Threat
User Behavior Analysis
Log Analysis Method

Predicting Process Name from Network Data

Authors: Justin Allen, David Knapp, Kristine Monteith | Published: 2021-09-03
Cyber Threat
Fundamentals of Machine Learning
Defense Mechanism