Diffusion containment in complex networks through collective influence of connections
We study the containment of diffusion in a network immunization perspective, whose
solution also plays fundamental roles in scenarios such as the inference of rumor sources …
solution also plays fundamental roles in scenarios such as the inference of rumor sources …
RFG-HELAD: A Robust Fine-Grained Network Traffic Anomaly Detection Model Based on Heterogeneous Ensemble Learning
Fine-grained attack detection is an important network security task. A large number of
machine learning/deep learning (ML/DL) based algorithms have been proposed. However …
machine learning/deep learning (ML/DL) based algorithms have been proposed. However …
Guided erasable adversarial attack (GEAA) toward shared data protection
In recent years, there has been increasing interest in studying the adversarial attack, which
poses potential risks to deep learning applications and has stimulated numerous …
poses potential risks to deep learning applications and has stimulated numerous …
[HTML][HTML] Defeating deep learning based de-anonymization attacks with adversarial example
Deep learning (DL) technologies bring new threats to network security. Website
fingerprinting attacks (WFA) using DL models can distinguish victim's browsing activities …
fingerprinting attacks (WFA) using DL models can distinguish victim's browsing activities …
A methodology for selecting hardware performance counters for supporting non-intrusive diagnostic of flood DDoS attacks on web servers
Web server outages caused by a Distributed Denial of Service (DDoS) attacks have
increased considerably over the years. Intrusion Detection Systems (IDS) are not sufficient to …
increased considerably over the years. Intrusion Detection Systems (IDS) are not sufficient to …
Cloud security in the age of adaptive adversaries: A game theoretic approach to hypervisor-based intrusion detection
Recent advancements in cloud computing have underscored the critical need for robust
security mechanisms to counter evolving cyber-threats. Traditional security solutions such as …
security mechanisms to counter evolving cyber-threats. Traditional security solutions such as …
Markov-based malware propagation modeling and analysis in multi-layer networks
S Karageorgiou, V Karyotis - Network, 2022 - mdpi.com
In this paper, we focus on the dynamics of the spread of malicious software (malware) in
multi-layer networks of various types, eg, cyber-physical systems. Recurring malware has …
multi-layer networks of various types, eg, cyber-physical systems. Recurring malware has …
From Traces to Packets: Realistic Deep Learning Based Multi-Tab Website Fingerprinting Attacks
Recent advancements in deep learning (DL) have introduced new security challenges in the
form of side-channel attacks. A prime example is the website fingerprinting attack (WFA) …
form of side-channel attacks. A prime example is the website fingerprinting attack (WFA) …
Turning the Hunted into the Hunter via Threat Hunting: Life Cycle, Ecosystem, Challenges and the Great Promise of AI
C Hillier, T Karroubi - arxiv preprint arxiv:2204.11076, 2022 - arxiv.org
The threat hunting lifecycle is a complex atmosphere that requires special attention from
professionals to maintain security. This paper is a collection of recent work that gives a …
professionals to maintain security. This paper is a collection of recent work that gives a …
Rethinking maximum-margin softmax for adversarial robustness
Learning discriminative features with adversarial behaviors can be extremely challenging to
build a robust learning model. This is partly evidenced by the difficulties in training robust …
build a robust learning model. This is partly evidenced by the difficulties in training robust …