セキュリティ分析

A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends

Authors: Yao Zhao, Youyang Qu, Yong Xiang, Md Palash Uddin, Dezhong Peng, Longxiang Gao | Published: 2022-10-20 | Updated: 2024-08-07
セキュリティ分析
プライバシーリスク管理
計算効率

Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2

Authors: Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti | Published: 2022-10-17 | Updated: 2023-04-30
セキュリティ分析
データプライバシー評価
プライバシーリスク管理

New Secure Sparse Inner Product with Applications to Machine Learning

Authors: Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu | Published: 2022-10-16
セキュリティ分析
暗号学
計算効率

Classification of Web Phishing Kits for early detection by platform providers

Authors: Andrea Venturi, Michele Colajanni, Marco Ramilli, Giorgio Valenziano Santangelo | Published: 2022-10-15
セキュリティ分析
悪意のあるウェブサイト検出
機械学習技術

IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge

Authors: Hidetoshi Kawaguchi, Yuichi Nakatani, Shogo Okada | Published: 2022-07-19
セキュリティ分析
専門家の意見収集
特徴重要度分析

Security and Safety Aspects of AI in Industry Applications

Authors: Hans Dermot Doran | Published: 2022-07-16
セキュリティ分析
トレーニングプロトコル
モデルアーキテクチャ

When a RF Beats a CNN and GRU, Together — A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification

Authors: Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2022-06-16
セキュリティ分析
データ選択戦略
分類パターン分析

YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC

Authors: Stefan More, Lukas Alber | Published: 2022-06-15
アクセス制御
セキュリティ分析
データ選択戦略

Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach

Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam | Published: 2022-04-11
セキュリティ分析
データ収集
深層転移学習

Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses

Authors: Satwik Kundu, Swaroop Ghosh | Published: 2022-04-07
セキュリティ分析
ハードウェアセキュリティ
量子機械学習