脅威モデリング

Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense

Authors: Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán | Published: 2023-07-21 | Updated: 2023-12-09
セキュアな通信チャネル
ポイズニング
脅威モデリング

A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks

Authors: Umara Noor, Sawera Shahid, Rimsha Kanwal, Zahid Rashid | Published: 2023-07-17
データセット生成
機械学習技術
脅威モデリング

Robust Ranking Explanations

Authors: Chao Chen, Chenghua Guo, Guixiang Ma, Ming Zeng, Xi Zhang, Sihong Xie | Published: 2023-07-08
ロバスト性に関する評価
脅威モデリング
説明可能性

Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives

Authors: Danele Lunghi, Alkis Simitsis, Olivier Caelen, Gianluca Bontempi | Published: 2023-07-03
敵対的サンプル
敵対的攻撃
脅威モデリング

MLSMM: Machine Learning Security Maturity Model

Authors: Felix Jedrzejewski, Davide Fucci, Oleksandr Adamov | Published: 2023-06-28
AIコンプライアンス
セキュリティラベル
脅威モデリング

Developing and Deploying Security Applications for In-Vehicle Networks

Authors: Samuel C Hollifield, Pablo Moriano, William L Lambert, Joel Asiamah, Isaac Sikkema, Michael D Iannacone | Published: 2023-06-27
マイクロコントローラ
脅威モデリング
車両ネットワーク

An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices

Authors: Vitalina Holubenko, Paulo Silva, Carlos Bento | Published: 2023-06-23
性能評価
脅威モデリング
連合学習

Do you still need a manual smart contract audit?

Authors: Isaac David, Liyi Zhou, Kaihua Qin, Dawn Song, Lorenzo Cavallaro, Arthur Gervais | Published: 2023-06-21 | Updated: 2023-06-22
スマートコントラクト
プログラム解析
脅威モデリング

You Don’t Need Robust Machine Learning to Manage Adversarial Attack Risks

Authors: Edward Raff, Michel Benaroch, Andrew L. Farris | Published: 2023-06-16
メンバーシップ推論
敵対的サンプル
脅威モデリング

Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier

Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic | Published: 2023-06-15
データ収集
脅威モデリング
計算効率