AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks

G Petihakis, A Farao, P Bountakas, A Sabazioti… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing integration of Artificial Intelligence (AI) in critical sectors such as healthcare,
finance, and cybersecurity has simultaneously exposed these systems to unique …

[HTML][HTML] Roadmap of Adversarial Machine Learning in Internet of Things-Enabled Security Systems

Y Harbi, K Medani, C Gherbi, Z Aliouat, S Harous - Sensors, 2024 - mdpi.com
Machine learning (ML) represents one of the main pillars of the current digital era,
specifically in modern real-world applications. The Internet of Things (IoT) technology is …

AI-Powered Penetration Testing using Shennina: From Simulation to Validation

S Karagiannis, C Fusco, L Agathos, W Mallouli… - Proceedings of the 19th …, 2024 - dl.acm.org
Artificial intelligence has been greatly improved nowadays, providing innovative approaches
in cybersecurity both on offensive and defensive tactics. AI can be specifically utilized to …

Outlier-Oriented Poisoning Attack: A Grey-box Approach to Disturb Decision Boundaries by Perturbing Outliers in Multiclass Learning

A Paracha, J Arshad, MB Farah, K Ismail - arXiv preprint arXiv:2411.00519, 2024 - arxiv.org
Poisoning attacks are a primary threat to machine learning models, aiming to compromise
their performance and reliability by manipulating training datasets. This paper introduces a …

NITRO: an Interconnected 5G-IoT Cyber Range

A Farao, C Ntantogian, S Karagiannis… - Proceedings of the 19th …, 2024 - dl.acm.org
This paper presents NITRO cyber range, which aims at creating a specialized cybersecurity
testing and training environment for 5G and IoT networks. NITRO provides a platform for …

Advanced cyber security solutions for critical infrastructure and applications: smart grid and cyber insurance

A Farao - 2024 - dione.lib.unipi.gr
The rapid digitization of critical infrastructure, coupled with the increasing sophistication of
cyber threats, has elevated the importance of robust cybersecurity measures. This …

[PDF][PDF] Cybersecurity Challenges and Pitfalls in 6G Networks

A Farao, V Bolgouras, A Zarras, C Xenakis - users.ics.forth.gr
The transition from 5G to 6G networks aims to improve connection speeds and intelligence
levels. 6G is expected to support machine-type communications and ultra-reliable …