Data Extraction and Analysis

First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data

Authors: Masataka Tasumi, Kazuki Iwahana, Naoto Yanai, Katsunari Shishido, Toshiya Shimizu, Yuji Higuchi, Ikuya Morikawa, Jun Yajima | Published: 2021-09-30
Data Extraction and Analysis
Data Generation
Performance Evaluation

An Automated Data Engineering Pipeline for Anomaly Detection of IoT Sensor Data

Authors: Xinze Li, Baixi Zou | Published: 2021-09-28
Data Extraction and Analysis
Data-Driven Clustering
Anomaly Detection Method

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14
Cybersecurity
Data Extraction and Analysis
Machine Learning Application

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey

Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams | Published: 2021-09-14
Cybersecurity
Data Extraction and Analysis
Proactive Defense

Deep Generative Models to Extend Active Directory Graphs with Honeypot Users

Authors: Ondrej Lukas, Sebastian Garcia | Published: 2021-09-13
Graph Neural Network
Data Extraction and Analysis
Data Generation

Stateful Detection of Model Extraction Attacks

Authors: Soham Pal, Yash Gupta, Aditya Kanade, Shirish Shevade | Published: 2021-07-12
Dataset Generation
Data Extraction and Analysis
Model Extraction Attack

Anomaly Detection using Principles of Human Perception

Authors: Nassir Mohammad | Published: 2021-03-23 | Updated: 2022-05-13
Data Extraction and Analysis
Anomaly Detection Algorithm
Statistical Methods

Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions

Authors: Michael Goebel, Jason Bunk, Srinjoy Chattopadhyay, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-03-19
Data Extraction and Analysis
Poisoning
Adversarial Attack Methods

Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets

Authors: Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed | Published: 2020-10-04
Dataset Generation
Data Extraction and Analysis
Attack Method

ProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships

Authors: Bobby Filar, David French | Published: 2020-08-11
Data Extraction and Analysis
Attacker Behavior Analysis
Machine Learning Framework