Developing and Deploying Security Applications for In-Vehicle Networks Authors: Samuel C Hollifield, Pablo Moriano, William L Lambert, Joel Asiamah, Isaac Sikkema, Michael D Iannacone | Published: 2023-06-27 MicrocontrollerThreat modelingVehicle Network 2023.06.27 2025.05.28 Literature Database
An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices Authors: Vitalina Holubenko, Paulo Silva, Carlos Bento | Published: 2023-06-23 Performance EvaluationThreat modelingFederated Learning 2023.06.23 2025.05.28 Literature Database
Do you still need a manual smart contract audit? Authors: Isaac David, Liyi Zhou, Kaihua Qin, Dawn Song, Lorenzo Cavallaro, Arthur Gervais | Published: 2023-06-21 | Updated: 2023-06-22 Smart ContractProgram AnalysisThreat modeling 2023.06.21 2025.05.28 Literature Database
You Don’t Need Robust Machine Learning to Manage Adversarial Attack Risks Authors: Edward Raff, Michel Benaroch, Andrew L. Farris | Published: 2023-06-16 Membership InferenceAdversarial ExampleThreat modeling 2023.06.16 2025.05.28 Literature Database
Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic | Published: 2023-06-15 Data CollectionThreat modelingComputational Efficiency 2023.06.15 2025.05.28 Literature Database
A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities Authors: Suman Maiti, Anjana B, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey | Published: 2023-06-15 Cyber AttackAttack Graph GenerationThreat modeling 2023.06.15 2025.05.28 Literature Database
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks Authors: Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea | Published: 2023-06-01 Deep Learning MethodThreat modelingVulnerability Analysis 2023.06.01 2025.05.28 Literature Database
SCART: Simulation of Cyber Attacks for Real-Time Authors: Kfir Girstein, Eliron Rahimi, Avi Mendelson | Published: 2023-04-07 Data GenerationThreat modelingOperational Scenario 2023.04.07 2025.05.28 Literature Database
Advanced Security Threat Modelling for Blockchain-Based FinTech Applications Authors: Serhan W. Bahar | Published: 2023-04-05 Security AnalysisThreat modelingVulnerability Mitigation Technique 2023.04.05 2025.05.28 Literature Database
Temporal Robustness against Data Poisoning Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-02-07 | Updated: 2023-12-06 DNN IP Protection MethodPoisoning AttackThreat modeling 2023.02.07 2025.05.28 Literature Database