データ抽出と分析

First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data

Authors: Masataka Tasumi, Kazuki Iwahana, Naoto Yanai, Katsunari Shishido, Toshiya Shimizu, Yuji Higuchi, Ikuya Morikawa, Jun Yajima | Published: 2021-09-30
データ抽出と分析
データ生成
性能評価

An Automated Data Engineering Pipeline for Anomaly Detection of IoT Sensor Data

Authors: Xinze Li, Baixi Zou | Published: 2021-09-28
データ抽出と分析
データ駆動型クラスタリング
異常検出手法

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14
サイバーセキュリティ
データ抽出と分析
機械学習の応用

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey

Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams | Published: 2021-09-14
サイバーセキュリティ
データ抽出と分析
プロアクティブ防御

Deep Generative Models to Extend Active Directory Graphs with Honeypot Users

Authors: Ondrej Lukas, Sebastian Garcia | Published: 2021-09-13
グラフニューラルネットワーク
データ抽出と分析
データ生成

Stateful Detection of Model Extraction Attacks

Authors: Soham Pal, Yash Gupta, Aditya Kanade, Shirish Shevade | Published: 2021-07-12
データセット生成
データ抽出と分析
モデル抽出攻撃

Anomaly Detection using Principles of Human Perception

Authors: Nassir Mohammad | Published: 2021-03-23 | Updated: 2022-05-13
データ抽出と分析
異常検知アルゴリズム
統計的手法

Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions

Authors: Michael Goebel, Jason Bunk, Srinjoy Chattopadhyay, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-03-19
データ抽出と分析
ポイズニング
敵対的攻撃手法

Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets

Authors: Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed | Published: 2020-10-04
データセット生成
データ抽出と分析
攻撃手法

ProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships

Authors: Bobby Filar, David French | Published: 2020-08-11
データ抽出と分析
攻撃者の行動分析
機械学習フレームワーク