セキュリティ分析

When a RF Beats a CNN and GRU, Together — A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification

Authors: Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2022-06-16
セキュリティ分析
データ選択戦略
分類パターン分析

YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC

Authors: Stefan More, Lukas Alber | Published: 2022-06-15
アクセス制御
セキュリティ分析
データ選択戦略

Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach

Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam | Published: 2022-04-11
セキュリティ分析
データ収集
深層転移学習

Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses

Authors: Satwik Kundu, Swaroop Ghosh | Published: 2022-04-07
セキュリティ分析
ハードウェアセキュリティ
量子機械学習

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats

Authors: Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic | Published: 2022-04-07 | Updated: 2022-04-17
APT攻撃の特性
セキュリティ分析
異常検出手法

Android Malware Category and Family Detection and Identification using Machine Learning

Authors: Ahmed Hashem El Fiky, Ayman El Shenawy, Mohamed Ashraf Madkour | Published: 2021-07-05
セキュリティ分析
機械学習
機械学習技術

ESCAPED: Efficient Secure and Private Dot Product Framework for Kernel-based Machine Learning Algorithms with Applications in Healthcare

Authors: Ali Burak Ünal, Mete Akgün, Nico Pfeifer | Published: 2020-12-04
セキュリティ分析
フレームワーク
機械学習のプライバシー保護

TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic

Authors: Peter Jachim, Filipo Sharevski, Paige Treebridge | Published: 2020-12-04 | Updated: 2020-12-07
コンテンツモデレーション
セキュリティ分析
敵対的学習

Clustering and Analysis of Vulnerabilities Present in Different Robot Types

Authors: Chinwe Ekenna, Bharvee Acharya | Published: 2020-08-18
クラスタリング手法
セキュリティ分析
脅威モデル

Sniffing for Codebase Secret Leaks with Known Production Secrets in Industry

Authors: Zhen Yu Ding, Benjamin Khakshoor, Justin Paglierani, Mantej Rajpal | Published: 2020-08-13
ウォーターマーキング
コード変更分析
セキュリティ分析