異常検出手法

A White-Box Adversarial Attack Against a Digital Twin

Authors: Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi | Published: 2022-10-25
サイバー攻撃
敵対的訓練
異常検出手法

GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV

Authors: Anum Talpur, Mohan Gurusamy | Published: 2022-04-23 | Updated: 2022-09-12
データ汚染検出
異常検出手法
車両ネットワークセキュリティ

Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks

Authors: Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava | Published: 2022-04-21
プライバシー保護手法
機械学習の基礎
異常検出手法

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats

Authors: Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic | Published: 2022-04-07 | Updated: 2022-04-17
APT攻撃の特性
セキュリティ分析
異常検出手法

Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks

Authors: Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger | Published: 2022-01-31 | Updated: 2022-04-25
深層学習に基づくIDS
異常検出手法
自動車ネットワークセキュリティ

An Automated Data Engineering Pipeline for Anomaly Detection of IoT Sensor Data

Authors: Xinze Li, Baixi Zou | Published: 2021-09-28
データ抽出と分析
データ駆動型クラスタリング
異常検出手法

Modern Cybersecurity Solution using Supervised Machine Learning

Authors: Mustafa Sakhai, Maciej Wielgosz | Published: 2021-09-15
性能評価
機械学習の応用
異常検出手法

Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis

Authors: Chuanpu Fu, Qi Li, Meng Shen, Ke Xu | Published: 2021-06-28 | Updated: 2021-09-16
特徴抽出手法
異常検出手法
通信解析

Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network

Authors: Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk | Published: 2021-03-31
MLベースのIDS
機械学習手法
異常検出手法

MISA: Online Defense of Trojaned Models using Misattributions

Authors: Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha | Published: 2021-03-29 | Updated: 2021-09-23
敵対的サンプルの脆弱性
異常検出手法
脅威モデリング