Sparse AC FDI attacks can compromise power system stability through minimal measurement changes.
Mohammadreza Iranpour, Mohammad Rasoul Narimani
― 5 min read
Cutting edge science explained simply
Sparse AC FDI attacks can compromise power system stability through minimal measurement changes.
Mohammadreza Iranpour, Mohammad Rasoul Narimani
― 5 min read
Examining risks and solutions for memory safety in IoT devices.
Vadim Safronov, Ionut Bostan, Nicholas Allott
― 6 min read
Discover how RA-WEBs enhances web service security using Trusted Execution Environments.
Kosei Akama, Yoshimichi Nakatsuka, Korry Luke
― 6 min read
A new method to protect smart meters from FDI attacks while preserving privacy.
Md Raihan Uddin, Ratun Rahman, Dinh C. Nguyen
― 4 min read
A look into how Digital Twin technology enhances manufacturing processes.
Chas Hamel, Md Manjurul Ahsan, Shivakumar Raman
― 6 min read
Researchers present a cost-effective approach to privacy risks in large language models.
Rongting Zhang, Martin Bertran, Aaron Roth
― 6 min read
Examining how adversarial attacks impact text and image classification models.
Langalibalele Lunga, Suhas Sreehari
― 6 min read
AI is transforming how we address software vulnerabilities effectively.
Yuntong Zhang, Jiawei Wang, Dominic Berzin
― 6 min read
A fresh framework combines IDS and UEBA for better threat detection.
Zilin Huang, Xiangyan Tang, Hongyu Li
― 6 min read
Discover how safety guardrails protect smart models from harmful prompts.
Sejoon Oh, Yiqiao Jin, Megha Sharma
― 5 min read
Federated Learning offers a new way to protect data while collaborating across devices.
Chunlu Chen, Ji Liu, Haowen Tan
― 7 min read
Learn how businesses can use ML to detect and prevent DoS attacks.
Paul Badu Yakubu, Evans Owusu, Lesther Santana
― 7 min read
Learn about APTs and how new detection methods enhance cybersecurity.
Weiheng Wu, Wei Qiao, Wenhao Yan
― 8 min read
Using visual tools to enhance detection of threats in networks.
Maraz Mia, Mir Mehedi A. Pritom, Tariqul Islam
― 7 min read
Assessing the usefulness of EPSS for predicting security vulnerabilities.
Rianna Parla
― 8 min read
Generative AI is transforming productivity in security operations centers for faster incident response.
James Bono, Justin Grana, Alec Xu
― 7 min read
CryptoEL offers a fun way for kids to learn about digital security.
Pranathi Rayavaram, Ukaegbu Onyinyechukwu, Maryam Abbasalizadeh
― 5 min read
This paper presents a new approach to creating synthetic data for analysis and modeling.
Mohammad Zbeeb, Mohammad Ghorayeb, Mariam Salman
― 10 min read
A study on improving device identification methods for better IoT security.
Kahraman Kostas, Rabia Yasa Kostas, Mike Just
― 6 min read
A new method to identify Trojan backdoors in neural networks.
Todd Huster, Peter Lin, Razvan Stefanescu
― 7 min read
This study examines how LLMs can detect domain generation algorithms in cybersecurity.
Reynier Leyva La O, Carlos A. Catania, Tatiana Parlanti
― 7 min read
Strategies to safeguard images from unauthorized reconstruction.
Tao Huang, Jiayang Meng, Hong Chen
― 5 min read
Examining vulnerabilities of Spiking Neural Networks through clever attack methods.
Roberto Riaño, Gorka Abad, Stjepan Picek
― 6 min read
Learn how Federated Learning enhances privacy in machine learning while facing new threats.
Isaac Baglin, Xiatian Zhu, Simon Hadfield
― 10 min read
Using Generative AI to create security controls in minutes, not days.
Chen Ling, Mina Ghashami, Vianne Gao
― 8 min read
This article presents a new method for identifying changes in event data.
Zeyue Zhang, Xiaoling Lu, Feng Zhou
― 5 min read
FedRISE enhances federated learning by filtering bad data updates for better model training.
Joseph Geo Benjamin, Mothilal Asokan, Mohammad Yaqub
― 7 min read
QuanCrypt-FL enhances security in Federated Learning using advanced techniques.
Md Jueal Mia, M. Hadi Amini
― 6 min read
Examining the risks and defenses of Multi-Modal Language Models in AI.
Pete Janowczyk, Linda Laurier, Ave Giulietta
― 6 min read
Examining how advanced models enhance analysis of security flaws in binary code.
Dylan Manuel, Nafis Tanveer Islam, Joseph Khoury
― 7 min read
Protecting deep regression models from hidden threats is crucial for safety.
Lingyu Du, Yupei Liu, Jinyuan Jia
― 4 min read
Learn about MISGUIDE and its role in enhancing smart grid security.
Nur Imtiazul Haque, Prabin Mali, Mohammad Zakaria Haider
― 6 min read
GeogGNN utilizes geographic data to improve cybercrime prediction and classification.
Muhammad Al-Zafar Khan, Jamal Al-Karaki, Emad Mahafzah
― 7 min read
Learn how machine learning helps secure smart devices against cyber threats.
Sushil Shakya, Robert Abbas
― 5 min read
Data forging attacks pose serious threats to model integrity and privacy.
Mohamed Suliman, Anisa Halimi, Swanand Kadhe
― 6 min read
We need more focus on training in hardware reverse engineering for better security.
René Walendy, Markus Weber, Steffen Becker
― 7 min read
A new lightweight signature method enhances security for smart devices.
Kiarash Sedghighadikolaei, Attila A. Yavuz, Saif E. Nouma
― 5 min read
EUREKHA offers a fresh approach to spot cybercriminals in underground forums.
Abdoul Nasser Hassane Amadou, Anas Motii, Saida Elouardi
― 7 min read
Learn how SD-WAN simplifies network management and reduces costs for growing businesses.
Chaoran Sun, Milena Radenkovic
― 6 min read
A new method improves defenses for language models against manipulative attacks.
Chong Zhang, Mingyu Jin, Dong Shu
― 4 min read