[HTML][HTML] Uniting cyber security and machine learning: Advantages, challenges and future research
Abstract Machine learning (ML) is a subset of Artificial Intelligence (AI), which focuses on the
implementation of some systems that can learn from the historical data, identify patterns and …
implementation of some systems that can learn from the historical data, identify patterns and …
[HTML][HTML] Evolving techniques in cyber threat hunting: A systematic review
In the rapidly changing cybersecurity landscape, threat hunting has become a critical
proactive defense against sophisticated cyber threats. While traditional security measures …
proactive defense against sophisticated cyber threats. While traditional security measures …
“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Sok: Explainable machine learning for computer security applications
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …
Generalizing intrusion detection for heterogeneous networks: A stacked-unsupervised federated learning approach
The constantly evolving digital transformation imposes new requirements on our society.
Aspects relating to reliance on the networking domain and the difficulty of achieving security …
Aspects relating to reliance on the networking domain and the difficulty of achieving security …
[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical …
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …
and services that are vital for the functioning and well-being of a society, economy, or nation …
Enhancing ransomware attack detection using transfer learning and deep learning ensemble models on cloud-encrypted data
Ransomware attacks on cloud-encrypted data pose a significant risk to the security and
privacy of cloud-based businesses and their consumers. We present RANSOMNET+, a state …
privacy of cloud-based businesses and their consumers. We present RANSOMNET+, a state …
A survey on malware detection with graph representation learning
Malware detection has become a major concern due to the increasing number and
complexity of malware. Traditional detection methods based on signatures and heuristics …
complexity of malware. Traditional detection methods based on signatures and heuristics …
[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
Review of cyberattack implementation, detection, and mitigation methods in cyber-physical systems
With the rapid proliferation of cyber-physical systems (CPSs) in various sectors, including
critical infrastructure, transportation, healthcare, and the energy industry, there is a pressing …
critical infrastructure, transportation, healthcare, and the energy industry, there is a pressing …