Beware of the Unexpected: Bimodal Taint Analysis Authors: Yiu Wai Chow, Max Schäfer, Michael Pradel | Published: 2023-01-25 Software SecurityProgram AnalysisVulnerability Management 2023.01.25 2025.05.12 Literature Database
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa | Published: 2023-01-18 | Updated: 2023-01-19 PoisoningMembership InferenceVulnerability Management 2023.01.18 2025.05.12 Literature Database
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák | Published: 2022-06-29 Cyber ThreatSoftware SecurityVulnerability Management 2022.06.29 2025.05.13 Literature Database
xFuzz: Machine Learning Guided Cross-Contract Fuzzing Authors: Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, Jianjun Zhao | Published: 2021-11-24 | Updated: 2022-06-30 Smart ContractVulnerability ManagementStatic Analysis 2021.11.24 2025.05.13 Literature Database
Social Media Monitoring for IoT Cyber-Threats Authors: Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou | Published: 2021-09-09 AlgorithmCybersecurityVulnerability Management 2021.09.09 2025.05.13 Literature Database
Improving Vulnerability Prediction of JavaScript Functions Using Process Metrics Authors: Tamás Viszkok, Péter Hegedűs, Rudolf Ferenc | Published: 2021-05-16 Class ImbalanceModel SelectionVulnerability Management 2021.05.16 2025.05.13 Literature Database
Advanced Metering Infrastructures: Security Risks and Mitigation Authors: Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles | Published: 2021-05-10 ML-Based IDSCyber AttackVulnerability Management 2021.05.10 2025.05.13 Literature Database
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha | Published: 2021-01-07 | Updated: 2022-10-19 Attack TypeMachine Learning MethodVulnerability Management 2021.01.07 2025.05.13 Literature Database
Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version) Authors: Gautam Raj Mode, Khaza Anuarul Hoque | Published: 2020-09-21 | Updated: 2020-09-28 PoisoningAdversarial TrainingVulnerability Management 2020.09.21 2025.05.13 Literature Database
Early detection of the advanced persistent threat attack using performance analysis of deep learning Authors: Javad Hassannataj Joloudari, Mojtaba Haderbadi, Amir Mashmool, Mohammad GhasemiGol, Shahab S., Amir Mosavi | Published: 2020-09-19 Network Threat DetectionUnknown Attack DetectionVulnerability Management 2020.09.19 2025.05.13 Literature Database