Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants

Authors: P. D. Ledger, B. A. Wilson, A. A. S. Amad, W. R. B. Lionheart | Published: 2020-12-18

Learning from History for Byzantine Robust Optimization

Authors: Sai Praneeth Karimireddy, Lie He, Martin Jaggi | Published: 2020-12-18 | Updated: 2021-06-29

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17

Machine Learning for Detecting Data Exfiltration: A Review

Authors: Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire | Published: 2020-12-17 | Updated: 2021-03-21

Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach

Authors: MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami | Published: 2020-12-16

Optimized Random Forest Model for Botnet Detection Based on DNS Queries

Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami | Published: 2020-12-16

An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center

Authors: Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles, Dan Scofield | Published: 2020-12-16

Exacerbating Algorithmic Bias through Fairness Attacks

Authors: Ninareh Mehrabi, Muhammad Naveed, Fred Morstatter, Aram Galstyan | Published: 2020-12-16

FoggySight: A Scheme for Facial Lookup Privacy

Authors: Ivan Evtimov, Pascal Sturmfels, Tadayoshi Kohno | Published: 2020-12-15

Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach

Authors: Noah Oghenfego Ogwara, Krassie Petrova, Mee Loong, Yang, Stephen G. MacDonell | Published: 2020-12-15