Proactive Defense

Mitigating Evasion Attacks in Fog Computing Resource Provisioning Through Proactive Hardening

Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26
Proactive Defense
Attackers and Malicious Devices
評価メトリクス

The Cognitive Firewall:Securing Browser Based AI Agents Against Indirect Prompt Injection Via Hybrid Edge Cloud Defense

Authors: Qianlong Lan, Anuj Kaul | Published: 2026-03-24
Indirect Prompt Injection
Proactive Defense
Attackers and Malicious Devices

ScamDetect: Towards a Robust, Agnostic Framework to Uncover Threats in Smart Contracts

Authors: Pasquale De Rosa, Pascal Felber, Valerio Schiavoni | Published: 2025-08-09 | Updated: 2025-08-12
Framework
Proactive Defense

Siren — Advancing Cybersecurity through Deception and Adaptive Analysis

Authors: Samhruth Ananthanarayanan, Girish Kulathumani, Ganesh Narayanan | Published: 2024-06-10 | Updated: 2025-04-24
Cybersecurity
Proactive Defense
Cryptography

Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare

Authors: Tao Li, Quanyan Zhu | Published: 2024-03-14 | Updated: 2024-08-19
Cybersecurity
Proactive Defense
Strategic Game

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey

Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams | Published: 2021-09-14
Cybersecurity
Data Extraction and Analysis
Proactive Defense

Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning

Authors: Yi Shi, Yalin E. Sagduyu | Published: 2021-07-22
Proactive Defense
Membership Inference
Defense Mechanism

Securing the Internet of Things in the Age of Machine Learning and Software-defined Networking

Authors: Francesco Restuccia, Salvatore D'Oro, Tommaso Melodia | Published: 2018-03-13 | Updated: 2018-06-11
IoT Security Challenges
Proactive Defense
Detection of Model Extraction Attacks

Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach

Authors: Khoi Khac Nguyen, Dinh Thai Hoang, Dusit Niyato, Ping Wang, Diep Nguyen, Eryk Dutkiewicz | Published: 2017-12-16
ML-Based IDS
Proactive Defense
Machine Learning Algorithm

The best defense is a good offense: Countering black box attacks by predicting slightly wrong labels

Authors: Yannic Kilcher, Thomas Hofmann | Published: 2017-11-15
Backdoor Detection
Proactive Defense
Certified Robustness