ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System Authors: Tommaso Puccetti, Simone Nardi, Cosimo Cinquilli, Tommaso Zoppi, Andrea Ceccarelli | Published: 2024-02-13 CybersecurityData CollectionIntrusion Detection System 2024.02.13 2025.05.27 Literature Database
ReposVul: A Repository-Level High-Quality Vulnerability Dataset Authors: Xinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao | Published: 2024-01-24 | Updated: 2024-02-08 Code Change AnalysisData CollectionVulnerability Management 2024.01.24 2025.05.27 Literature Database
Cross-Domain AI for Early Attack Detection and Defense Against Malicious Flows in O-RAN Authors: Bruno Missi Xavier, Merim Dzaferagic, Irene Vilà, Magnos Martinello, Marco Ruffini | Published: 2024-01-17 O-RAN SecurityCyber AttackData Collection 2024.01.17 2025.05.27 Literature Database
Risk factor aggregation and stress testing Authors: Natalie Packham | Published: 2023-10-06 Clustering methodsData CollectionMachine Learning Method 2023.10.06 2025.05.28 Literature Database
Threat Trekker: An Approach to Cyber Threat Hunting Authors: Ángel Casanova Bienzobas, Alfonso Sánchez-Macián | Published: 2023-10-06 Class ImbalanceData CollectionMachine Learning Method 2023.10.06 2025.05.28 Literature Database
Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To! Authors: Xiangyu Qi, Yi Zeng, Tinghao Xie, Pin-Yu Chen, Ruoxi Jia, Prateek Mittal, Peter Henderson | Published: 2023-10-05 Data CollectionPrompt InjectionInformation Gathering Methods 2023.10.05 2025.05.28 Literature Database
The Anatomy of Deception: Technical and Human Perspectives on a Large-scale Phishing Campaign Authors: Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis | Published: 2023-10-05 Data CollectionUser Activity AnalysisVictim Statistics 2023.10.05 2025.05.28 Literature Database
Beyond Labeling Oracles: What does it mean to steal ML models? Authors: Avital Shafran, Ilia Shumailov, Murat A. Erdogdu, Nicolas Papernot | Published: 2023-10-03 | Updated: 2024-06-13 Data CollectionKnowledge Extraction Methodevaluation metrics 2023.10.03 2025.05.28 Literature Database
A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums Authors: Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci | Published: 2023-08-18 Data CollectionModel Performance EvaluationMachine Learning Technology 2023.08.18 2025.05.28 Literature Database
PURL: Safe and Effective Sanitization of Link Decoration Authors: Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby | Published: 2023-08-07 | Updated: 2024-03-06 WatermarkingData Protection MethodData Collection 2023.08.07 2025.05.28 Literature Database