Threat modeling

Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense

Authors: Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán | Published: 2023-07-21 | Updated: 2023-12-09
Secure Communication Channel
Poisoning
Threat modeling

A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks

Authors: Umara Noor, Sawera Shahid, Rimsha Kanwal, Zahid Rashid | Published: 2023-07-17
Dataset Generation
Machine Learning Technology
Threat modeling

Robust Ranking Explanations

Authors: Chao Chen, Chenghua Guo, Guixiang Ma, Ming Zeng, Xi Zhang, Sihong Xie | Published: 2023-07-08
Robustness Evaluation
Threat modeling
Explainability

Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives

Authors: Danele Lunghi, Alkis Simitsis, Olivier Caelen, Gianluca Bontempi | Published: 2023-07-03
Adversarial Example
Adversarial attack
Threat modeling

MLSMM: Machine Learning Security Maturity Model

Authors: Felix Jedrzejewski, Davide Fucci, Oleksandr Adamov | Published: 2023-06-28
AI Compliance
Security label
Threat modeling

Developing and Deploying Security Applications for In-Vehicle Networks

Authors: Samuel C Hollifield, Pablo Moriano, William L Lambert, Joel Asiamah, Isaac Sikkema, Michael D Iannacone | Published: 2023-06-27
Microcontroller
Threat modeling
Vehicle Network

An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices

Authors: Vitalina Holubenko, Paulo Silva, Carlos Bento | Published: 2023-06-23
Performance Evaluation
Threat modeling
Federated Learning

Do you still need a manual smart contract audit?

Authors: Isaac David, Liyi Zhou, Kaihua Qin, Dawn Song, Lorenzo Cavallaro, Arthur Gervais | Published: 2023-06-21 | Updated: 2023-06-22
Smart Contract
Program Analysis
Threat modeling

You Don’t Need Robust Machine Learning to Manage Adversarial Attack Risks

Authors: Edward Raff, Michel Benaroch, Andrew L. Farris | Published: 2023-06-16
Membership Inference
Adversarial Example
Threat modeling

Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier

Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic | Published: 2023-06-15
Data Collection
Threat modeling
Computational Efficiency