脆弱性管理

Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy

Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa | Published: 2023-01-18 | Updated: 2023-01-19
ポイズニング
メンバーシップ推論
脆弱性管理

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations

Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák | Published: 2022-06-29
サイバー脅威
ソフトウェアセキュリティ
脆弱性管理

xFuzz: Machine Learning Guided Cross-Contract Fuzzing

Authors: Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, Jianjun Zhao | Published: 2021-11-24 | Updated: 2022-06-30
スマートコントラクト
脆弱性管理
静的分析

Social Media Monitoring for IoT Cyber-Threats

Authors: Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou | Published: 2021-09-09
アルゴリズム
サイバーセキュリティ
脆弱性管理

Improving Vulnerability Prediction of JavaScript Functions Using Process Metrics

Authors: Tamás Viszkok, Péter Hegedűs, Rudolf Ferenc | Published: 2021-05-16
クラス不均衡
モデル選択
脆弱性管理

Advanced Metering Infrastructures: Security Risks and Mitigation

Authors: Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles | Published: 2021-05-10
MLベースのIDS
サイバー攻撃
脆弱性管理

SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning

Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha | Published: 2021-01-07 | Updated: 2022-10-19
攻撃タイプ
機械学習手法
脆弱性管理

Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version)

Authors: Gautam Raj Mode, Khaza Anuarul Hoque | Published: 2020-09-21 | Updated: 2020-09-28
ポイズニング
敵対的訓練
脆弱性管理

Early detection of the advanced persistent threat attack using performance analysis of deep learning

Authors: Javad Hassannataj Joloudari, Mojtaba Haderbadi, Amir Mashmool, Mohammad GhasemiGol, Shahab S., Amir Mosavi | Published: 2020-09-19
ネットワーク脅威検出
未知の攻撃検出
脆弱性管理

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Authors: Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai | Published: 2020-08-10
データ抽出と分析
機械学習フレームワーク
脆弱性管理