サイバー攻撃

Bad Characters: Imperceptible NLP Attacks

Authors: Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2021-06-18 | Updated: 2021-12-11
サイバー攻撃
プロンプトインジェクション
機械学習の応用

Localized Uncertainty Attacks

Authors: Ousmane Amadou Dia, Theofanis Karaletsos, Caner Hazirbas, Cristian Canton Ferrer, Ilknur Kaynar Kabul, Erik Meijer | Published: 2021-06-17
サイバー攻撃
不確実性推定
敵対的サンプル

Intrusion Detection using Machine Learning Techniques: An Experimental Comparison

Authors: Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad | Published: 2021-05-27
MLベースのIDS
サイバー攻撃
分類パターン分析

MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles

Authors: Li Yang, Abdallah Moubayed, Abdallah Shami | Published: 2021-05-26
MLベースのIDS
サイバー攻撃
データ前処理

The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces

Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis | Published: 2021-05-25
サイバー攻撃
サイバー脅威
データ収集

Advanced Metering Infrastructures: Security Risks and Mitigation

Authors: Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles | Published: 2021-05-10
MLベースのIDS
サイバー攻撃
脆弱性管理

Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey

Authors: Vikas Hassija, Vinay Chamola, Adhar Agrawal, Adit Goyal, Nguyen Cong Luong, Dusit Niyato, F. Richard Yu, Mohsen Guizani | Published: 2021-05-04
DoS対策
サイバー攻撃
防御メカニズム

On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware

Authors: Molly Buchanan, Jeffrey W. Collyer, Jack W. Davidson, Saikat Dey, Mark Gardner, Jason D. Hiser, Jeffry Lang, Alastair Nottingham, Alina Oprea | Published: 2021-04-20 | Updated: 2022-05-27
MLベースのIDS
サイバー攻撃
データ管理システム

Machine Learning based IoT Edge Node Security Attack and Countermeasures

Authors: Vishalini R. Laguduva, Sheikh Ariful Islam, Sathyanarayanan Aakur, Srinivas Katkoori, Robert Karam | Published: 2019-09-17
サイバー攻撃
セキュリティ分析
機械学習手法