A White-Box Adversarial Attack Against a Digital Twin Authors: Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi | Published: 2022-10-25 サイバー攻撃敵対的訓練異常検出手法 2022.10.25 2025.05.12 Literature Database
GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV Authors: Anum Talpur, Mohan Gurusamy | Published: 2022-04-23 | Updated: 2022-09-12 データ汚染検出異常検出手法車両ネットワークセキュリティ 2022.04.23 2025.05.13 Literature Database
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks Authors: Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava | Published: 2022-04-21 プライバシー保護手法機械学習の基礎異常検出手法 2022.04.21 2025.05.13 Literature Database
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats Authors: Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic | Published: 2022-04-07 | Updated: 2022-04-17 APT攻撃の特性セキュリティ分析異常検出手法 2022.04.07 2025.05.13 Literature Database
Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks Authors: Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger | Published: 2022-01-31 | Updated: 2022-04-25 深層学習に基づくIDS異常検出手法自動車ネットワークセキュリティ 2022.01.31 2025.05.13 Literature Database
An Automated Data Engineering Pipeline for Anomaly Detection of IoT Sensor Data Authors: Xinze Li, Baixi Zou | Published: 2021-09-28 データ抽出と分析データ駆動型クラスタリング異常検出手法 2021.09.28 2025.05.13 Literature Database
Modern Cybersecurity Solution using Supervised Machine Learning Authors: Mustafa Sakhai, Maciej Wielgosz | Published: 2021-09-15 性能評価機械学習の応用異常検出手法 2021.09.15 2025.05.13 Literature Database
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis Authors: Chuanpu Fu, Qi Li, Meng Shen, Ke Xu | Published: 2021-06-28 | Updated: 2021-09-16 特徴抽出手法異常検出手法通信解析 2021.06.28 2025.05.13 Literature Database
Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network Authors: Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk | Published: 2021-03-31 MLベースのIDS機械学習手法異常検出手法 2021.03.31 2025.05.13 Literature Database
MISA: Online Defense of Trojaned Models using Misattributions Authors: Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha | Published: 2021-03-29 | Updated: 2021-09-23 敵対的サンプルの脆弱性異常検出手法脅威モデリング 2021.03.29 2025.05.13 Literature Database