Advanced Metering Infrastructures: Security Risks and Mitigation Authors: Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles | Published: 2021-05-10 ML-Based IDSCyber AttackVulnerability Management 2021.05.10 2025.05.28 Literature Database
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha | Published: 2021-01-07 | Updated: 2022-10-19 Attack TypeMachine Learning MethodVulnerability Management 2021.01.07 2025.05.28 Literature Database
Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version) Authors: Gautam Raj Mode, Khaza Anuarul Hoque | Published: 2020-09-21 | Updated: 2020-09-28 PoisoningAdversarial TrainingVulnerability Management 2020.09.21 2025.05.28 Literature Database
Early detection of the advanced persistent threat attack using performance analysis of deep learning Authors: Javad Hassannataj Joloudari, Mojtaba Haderbadi, Amir Mashmool, Mohammad GhasemiGol, Shahab S., Amir Mosavi | Published: 2020-09-19 Network Threat DetectionUnknown Attack DetectionVulnerability Management 2020.09.19 2025.05.28 Literature Database
An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions Authors: Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai | Published: 2020-08-10 Data Extraction and AnalysisMachine Learning FrameworkVulnerability Management 2020.08.10 2025.05.28 Literature Database
Provable robustness against all adversarial $l_p$-perturbations for $p\geq 1$ Authors: Francesco Croce, Matthias Hein | Published: 2019-05-27 | Updated: 2020-04-24 Multi-Class ClassificationVulnerability ManagementEvaluation Method 2019.05.27 2025.05.28 Literature Database