文献データベース

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14
サイバーセキュリティ
データ抽出と分析
機械学習の応用

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey

Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams | Published: 2021-09-14
サイバーセキュリティ
データ抽出と分析
プロアクティブ防御

Dodging Attack Using Carefully Crafted Natural Makeup

Authors: Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici | Published: 2021-09-14
メイクアップ攻撃
敵対的攻撃
顔認識システム

The mathematics of adversarial attacks in AI — Why deep learning is unstable despite the existence of stable neural networks

Authors: Alexander Bastounis, Anders C Hansen, Verner Vlačić | Published: 2021-09-13 | Updated: 2025-03-26
アルゴリズム
一般化性能
敵対的学習

Deep Generative Models to Extend Active Directory Graphs with Honeypot Users

Authors: Ondrej Lukas, Sebastian Garcia | Published: 2021-09-13
グラフニューラルネットワーク
データ抽出と分析
データ生成

Formalizing and Estimating Distribution Inference Risks

Authors: Anshuman Suri, David Evans | Published: 2021-09-13 | Updated: 2022-07-05
データ漏洩
メンバーシップ推論
敵対的学習

Differential Privacy in Personalized Pricing with Nonparametric Demand Models

Authors: Xi Chen, Sentao Miao, Yining Wang | Published: 2021-09-10
アルゴリズム
データプライバシー評価
プライバシーリスク管理

Social Media Monitoring for IoT Cyber-Threats

Authors: Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou | Published: 2021-09-09
アルゴリズム
サイバーセキュリティ
脆弱性管理

Automated Security Assessment for the Internet of Things

Authors: Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar | Published: 2021-09-09
リスク評価手法
機械学習
脆弱性検出

Detecting Attacks on IoT Devices using Featureless 1D-CNN

Authors: Arshiya Khan, Chase Cotton | Published: 2021-09-09
マルウェア検出手法
機械学習
通信解析