A new method improves log analysis and anomaly detection without labeled data.
― 8 min read
Cutting edge science explained simply
A new method improves log analysis and anomaly detection without labeled data.
― 8 min read
A method using VAEs enhances anomaly detection in Intrusion Detection Systems.
― 6 min read
A new framework improves IoT device security using advanced methods.
― 5 min read
A new method combines Federated Learning and Adversarial Training for insider threat detection.
― 6 min read
Exploring Reverse Preference Attacks and their impact on model safety.
― 5 min read
A new AI-driven platform aims to enhance security in healthcare.
― 6 min read
PromSec optimizes prompts for generating secure and functional code with LLMs.
― 7 min read
Introducing PureDiffusion to enhance defense mechanisms against backdoor threats.
― 6 min read
Examining efficient attacks on Automatic Modulation Classification using the Golden Ratio.
― 5 min read
Research reveals how drones can be tricked into unsafe flight paths.
― 6 min read
Proxy contracts in Ethereum offer benefits but come with significant security concerns.
― 7 min read
This article examines a fresh approach to secure public-key encryption.
― 5 min read
This study focuses on enhancing fraud detection methods through advanced technology.
― 5 min read
New methods improve strategies for defending systems against attacks.
― 6 min read
A new approach to classify malware efficiently using fewer labeled samples.
― 8 min read
A new method uses language models for better URL safety assessment.
― 6 min read
Examining the privacy challenges associated with Federated Learning and gradient inversion attacks.
― 7 min read
MEGA-PT improves penetration testing effectiveness and adaptability for better cybersecurity.
― 5 min read
A study reveals the rise of cybercrime activity on Telegram channels.
― 4 min read
RPKI strengthens Internet routing by verifying data authenticity.
― 7 min read
This work presents new methods for detecting malware using visualization and machine learning.
― 5 min read
Examining firmware vulnerabilities and the tools to enhance security.
― 7 min read
Exploring the role of Semantic Communication and security in next-gen networks.
― 8 min read
This article examines browser fingerprinting's role in online advertising and its privacy concerns.
― 6 min read
A new memory allocator improves security against Rowhammer attacks while maintaining performance.
― 6 min read
Addressing security risks in generative AI through red and blue teaming.
― 5 min read
Assessing the effectiveness of LLMs for threat analysis.
― 10 min read
Enhancing detection methods for harmful packages in software repositories.
― 6 min read
New methods improve actuator security in Cyber-Physical Systems to prevent attacks.
― 5 min read
Exploring the balance between adversarial threats and proactive measures in machine learning.
― 6 min read
Research reveals risks in smartphone motion sensors, highlighting privacy concerns.
― 5 min read
Analyzing connections between CAPEC and ATT&CK for improved risk assessments.
― 7 min read
Explore the privacy concerns surrounding membership inference attacks in machine learning.
― 5 min read
A new approach enhances fraud detection using quantum computing and SVM models.
― 6 min read
A study on the importance of evaluation metrics in anomaly detection.
― 5 min read
This benchmark evaluates privacy threats and defense mechanisms in NLP models.
― 8 min read
A look at how AI detects and analyzes online fraud.
― 8 min read
Selective encryption enhances privacy while maintaining model performance in collaborative learning.
― 6 min read
Introducing a framework for secure training of machine learning models.
― 5 min read
AI technology is changing the landscape of vishing scams, increasing risks for individuals.
― 5 min read