脅威モデリング

Developing and Deploying Security Applications for In-Vehicle Networks

Authors: Samuel C Hollifield, Pablo Moriano, William L Lambert, Joel Asiamah, Isaac Sikkema, Michael D Iannacone | Published: 2023-06-27
マイクロコントローラ
脅威モデリング
車両ネットワーク

An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices

Authors: Vitalina Holubenko, Paulo Silva, Carlos Bento | Published: 2023-06-23
性能評価
脅威モデリング
連合学習

Do you still need a manual smart contract audit?

Authors: Isaac David, Liyi Zhou, Kaihua Qin, Dawn Song, Lorenzo Cavallaro, Arthur Gervais | Published: 2023-06-21 | Updated: 2023-06-22
スマートコントラクト
プログラム解析
脅威モデリング

You Don’t Need Robust Machine Learning to Manage Adversarial Attack Risks

Authors: Edward Raff, Michel Benaroch, Andrew L. Farris | Published: 2023-06-16
メンバーシップ推論
敵対的サンプル
脅威モデリング

Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier

Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic | Published: 2023-06-15
データ収集
脅威モデリング
計算効率

A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities

Authors: Suman Maiti, Anjana B, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey | Published: 2023-06-15
サイバー攻撃
攻撃グラフ生成
脅威モデリング

Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea | Published: 2023-06-01
深層学習手法
脅威モデリング
脆弱性分析

SCART: Simulation of Cyber Attacks for Real-Time

Authors: Kfir Girstein, Eliron Rahimi, Avi Mendelson | Published: 2023-04-07
データ生成
脅威モデリング
運用シナリオ

Advanced Security Threat Modelling for Blockchain-Based FinTech Applications

Authors: Serhan W. Bahar | Published: 2023-04-05
セキュリティ分析
脅威モデリング
脆弱性回避手法

Temporal Robustness against Data Poisoning

Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-02-07 | Updated: 2023-12-06
DNN IP保護手法
ポイズニング攻撃
脅威モデリング