Search Results - "2021 IEEE International Conference on Cyber Security and Resilience (CSR)"

Refine Results
  1. 1

    Resilience learning through self adaptation in digital twins of human-cyber-physical systems by Bellini, Emanuele, Bagnoli, Franco, Caporuscio, Mauro, Damiani, Ernesto, Flammini, Francesco, Linkov, Igor, Lio, Pietro, Marrone, Stefano

    “…Human-Cyber-Physical-Systems (HPCS), such as critical infrastructures in modern society, are subject to several systemic threats due to their complex…”
    Get full text
    Conference Proceeding
  2. 2

    SK-Tree: a systematic malware detection algorithm on streaming trees via the signature kernel by Cochrane, Thomas, Foster, Peter, Chhabra, Varun, Lemercier, Maud, Lyons, Terry, Salvi, Cristopher

    “…The development of machine learning algorithms in the cyber security domain has been impeded by the complex, hierarchical, sequential and multimodal nature of…”
    Get full text
    Conference Proceeding
  3. 3

    Machine Learning for Threat Recognition in Critical Cyber-Physical Systems by Perrone, Paola, Flammini, Francesco, Setola, Roberto

    “…Cybersecurity has become an emerging challenge for business information management and critical infrastructure protection in recent years. Artificial…”
    Get full text
    Conference Proceeding
  4. 4

    Machine learning on knowledge graphs for context-aware security monitoring by Garrido, Josep Soler, Dold, Dominik, Frank, Johannes

    “…Machine learning techniques are gaining attention in the context of intrusion detection due to the increasing amounts of data generated by monitoring tools, as…”
    Get full text
    Conference Proceeding
  5. 5

    Named Entity Recognition in Cyber Threat Intelligence Using Transformer-based Models by Evangelatos, Pavlos, Iliou, Christos, Mavropoulos, Thanassis, Apostolou, Konstantinos, Tsikrika, Theodora, Vrochidis, Stefanos, Kompatsiaris, Ioannis

    “…The continuous increase in sophistication of threat actors over the years has made the use of actionable threat intelligence a critical part of the defence…”
    Get full text
    Conference Proceeding
  6. 6

    Towards Resilient Artificial Intelligence: Survey and Research Issues by Eigner, Oliver, Eresheim, Sebastian, Kieseberg, Peter, Klausner, Lukas Daniel, Pirker, Martin, Priebe, Torsten, Tjoa, Simon, Marulli, Fiammetta, Mercaldo, Francesco

    “…Artificial intelligence (AI) systems are becoming critical components of today's IT landscapes. Their resilience against attacks and other environmental…”
    Get full text
    Conference Proceeding
  7. 7

    Towards a Maritime Cyber Range training environment by Potamos, Georgios, Peratikou, Adamantini, Stavrou, Stavros

    “…Maritime Organizations, private companies, Governmental and Legal Authorities related to the Maritime Domain are significantly considering the impact of…”
    Get full text
    Conference Proceeding
  8. 8

    STRIDE-AI: An Approach to Identifying Vulnerabilities of Machine Learning Assets by Mauri, Lara, Damiani, Ernesto

    “…We propose a security methodology for Machine Learning (ML) pipelines, supporting the definition of key security properties of ML assets, the identification of…”
    Get full text
    Conference Proceeding
  9. 9

    The Cyber-MAR Project: First Results and Perspectives on the Use of Hybrid Cyber Ranges for Port Cyber Risk Assessment by Jacq, Olivier, Salazar, Pablo Gimenez, Parasuraman, Kamban, Kuusijarvi, Jarkko, Gkaniatsou, Andriana, Latsa, Evangelia, Amditis, Angelos

    “…With over 80% of goods transportation in volume carried by sea, ports are key infrastructures within the logistics value chain. To address the challenges of…”
    Get full text
    Conference Proceeding
  10. 10

    DAHID: Domain Adaptive Host-based Intrusion Detection by Ajayi, Oluwagbemiga, Gangopadhyay, Aryya

    “…Cybersecurity is becoming increasingly important with the explosion of attack surfaces as more cyber-physical systems are being deployed. It is impractical to…”
    Get full text
    Conference Proceeding
  11. 11

    ENAD: An Ensemble Framework for Unsupervised Network Anomaly Detection by Liao, Jingyi, Teo, Sin G., Pratim Kundu, Partha, Truong-Huu, Tram

    “…Network anomaly detection is paramount to early detect traffic anomalies and protect networks against cyber attacks such as (distributed) denial of service…”
    Get full text
    Conference Proceeding
  12. 12

    Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks by Pantelidis, Efthimios, Bendiab, Gueltoum, Shiaeles, Stavros, Kolokotronis, Nicholas

    “…Internal attacks are one of the biggest cybersecurity issues to companies and businesses. Despite the implemented perimeter security systems, the risk of…”
    Get full text
    Conference Proceeding
  13. 13

    Understanding and Mitigating Banking Trojans: From Zeus to Emotet by Grammatikakis, Konstantinos P., Koufos, Ioannis, Kolokotronis, Nicholas, Vassilakis, Costas, Shiaeles, Stavros

    “…Banking Trojans came a long way in the past decade, and the recent case of Emotet showed their enduring relevance. The evolution of the modern computing…”
    Get full text
    Conference Proceeding
  14. 14

    A tree-based machine learning methodology to automatically classify software vulnerabilities by Aivatoglou, Georgios, Anastasiadis, Mike, Spanos, Georgios, Voulgaridis, Antonis, Votis, Konstantinos, Tzovaras, Dimitrios

    “…Software vulnerabilities have become a major problem for the security analysts, since the number of new vulnerabilities is constantly growing. Thus, there was…”
    Get full text
    Conference Proceeding
  15. 15

    ECHO Federated Cyber Range: Towards Next-Generation Scalable Cyber Ranges by Oikonomou, Nikos, Mengidis, Notis, Spanopoulos-Karalexidis, Minas, Voulgaridis, Antonis, Merialdo, Matteo, Raisr, Ivo, Hanson, Kaarel, de La Vallee, Paloma, Tsikrika, Theodora, Vrochidis, Stefanos, Votis, Konstantinos

    “…Cyber ranges are valuable assets but have limitations in simulating complex realities and multi-sector dependencies; to address this, federated cyber ranges…”
    Get full text
    Conference Proceeding
  16. 16

    Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case Study by Swann, Matthew, Rose, Joseph, Bendiab, Gueltoum, Shiaeles, Stavros, Li, Fudong

    “…The use of gamified learning platforms as a method of introducing cyber security education, training and awareness has risen greatly. With this rise, the…”
    Get full text
    Conference Proceeding
  17. 17
  18. 18

    Enabling Cyber-attack Mitigation Techniques in a Software Defined Network by Pasias, Achilleas, Kotsiopoulos, Thanasis, Lazaridis, Georgios, Drosou, Anastasios, Tzovaras, Dimitrios, Sarigiannidis, Panagiotis

    “…Software Defined Networking (SDN) is an innovative technology, which can be applied in a plethora of applications and areas. Recently, SDN has been identified…”
    Get full text
    Conference Proceeding
  19. 19

    Detecting Adversarial DDoS Attacks in Software- Defined Networking Using Deep Learning Techniques and Adversarial Training by Nugraha, Beny, Kulkarni, Naina, Gopikrishnan, Akash

    “…In recent years, Deep Learning (DL) has been utilized for cyber-attack detection mechanisms as it offers highly accurate detection and is able to overcome the…”
    Get full text
    Conference Proceeding
  20. 20

    Detecting SQL Injection Web Attacks Using Ensemble Learners and Data Sampling by Zuech, Richard, Hancock, John, Khoshgoftaar, Taghi M.

    “…SQL Injection web attacks are a common choice among attackers to exploit web servers. We explore classification performance in detecting SQL Injection web…”
    Get full text
    Conference Proceeding