Vulnerability detection

IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications

Authors: KG Raghavendra Narayan, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Anish Chand Turlapaty, Ashok Kumar Das | Published: 2023-08-02
IoT Device Identification
Data Preprocessing
Vulnerability detection

Semisupervised Anomaly Detection using Support Vector Regression with Quantum Kernel

Authors: Kilian Tscharke, Sebastian Issel, Pascal Debus | Published: 2023-08-01 | Updated: 2024-01-03
Data Generation
Vulnerability detection
Quantum Cryptography Technology

Intrusion Detection Systems for Flying Ad-hoc Networks

Authors: Jordan Quinn, Safdar Hussain Bouk | Published: 2023-06-08
Energy Management
Network Threat Detection
Vulnerability detection

An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph

Authors: Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad | Published: 2023-04-17
Experimental Validation
Vulnerability detection
evaluation metrics

DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection

Authors: Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David Wagner | Published: 2023-04-01 | Updated: 2023-08-09
Security label
Prompt Injection
Vulnerability detection

PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks

Authors: Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu | Published: 2023-02-22 | Updated: 2023-04-06
DNN IP Protection Method
Watermarking
Vulnerability detection

Machine Learning and Port Scans: A Systematic Review

Authors: Jason M. Pittman | Published: 2023-01-31
Automation of Cybersecurity
Data Collection
Vulnerability detection

VulCurator: A Vulnerability-Fixing Commit Detector

Authors: Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Xuan-Bach D. Le, David Lo | Published: 2022-09-07
Model Design and Accuracy
Model Design
Vulnerability detection

Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations

Authors: Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng | Published: 2022-08-30
Attack Detection
Feature Importance Analysis
Vulnerability detection

CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models

Authors: Chuyen Nguyen, Caleb Morgan, Sudip Mittal | Published: 2022-08-16
Relationship of AI Systems
Attack Detection
Vulnerability detection