Zero-Day Threats Detection for Critical Infrastructures

Authors: Mike Nkongolo, Mahmut Tokmak | Published: 2023-06-10

Differentially private sliced inverse regression in the federated paradigm

Authors: Shuaida He, Jiarui Zhang, Xin Chen | Published: 2023-06-10 | Updated: 2023-08-10

Early Malware Detection and Next-Action Prediction

Authors: Zahra Jamadi, Amir G. Aghdam | Published: 2023-06-09

A Survey on Cross-Architectural IoT Malware Threat Hunting

Authors: Anandharaju Durai Raju, Ibrahim Abualhaol, Ronnie Salvador Giagone, Yang Zhou, Shengqiang Huang | Published: 2023-06-09

Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions

Authors: Ezgi Korkmaz, Jonah Brown-Cohen | Published: 2023-06-09

DETECTA: Investigación de metodologías no intrusivas apoyadas en tecnologías habilitadoras 4.0 para abordar un mantenimiento predictivo y ciberseguro en pymes industriales

Authors: Alvaro García, Alejandro Echeverría, José Félix Ovejero | Published: 2023-06-09

JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection

Authors: Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura | Published: 2023-06-09

Intrusion Detection Systems for Flying Ad-hoc Networks

Authors: Jordan Quinn, Safdar Hussain Bouk | Published: 2023-06-08

Prompt Injection attack against LLM-integrated Applications

Authors: Yi Liu, Gelei Deng, Yuekang Li, Kailong Wang, Zihao Wang, Xiaofeng Wang, Tianwei Zhang, Yepang Liu, Haoyu Wang, Yan Zheng, Yang Liu | Published: 2023-06-08 | Updated: 2024-03-02

FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users

Authors: Yogachandran Rahulamathavan, Charuka Herath, Xiaolan Liu, Sangarapillai Lambotharan, Carsten Maple | Published: 2023-06-08 | Updated: 2024-10-06