Machine learning (ML) models are known to be vulnerable to a number of
a...
IoT devices are known to be vulnerable to various cyber-attacks, such as...
Model agnostic feature attribution algorithms (such as SHAP and LIME) ar...
Adversarial attacks against deep learning-based object detectors (ODs) h...
State-of-the-art deep neural networks (DNNs) are highly effective at tac...
The sophistication and complexity of cyber attacks and the variety of
ta...
The Open Radio Access Network (O-RAN) is a new, open, adaptive, and
inte...
The Open Radio Access Network (O-RAN) is a promising RAN architecture, a...
Anti-malware agents typically communicate with their remote services to ...
Although cyberattacks on machine learning (ML) production systems can be...
Recent works have shown that the input domain of any machine learning
cl...
Attack graphs are one of the main techniques used to automate the risk
a...
The existence of a security vulnerability in a system does not necessari...
In many cases, neural network classifiers are likely to be exposed to in...
State-of-the-art deep neural networks (DNNs) are highly effective in sol...
Selecting the optimal set of countermeasures is a challenging task that
...
Information security awareness (ISA) is a practice focused on the set of...
An attack graph is a method used to enumerate the possible paths that an...
In recent years we have witnessed a shift towards personalized, context-...
The prevalence of IoT devices makes them an ideal target for attackers. ...