A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review
The emergence of the Internet of Things (IoT) technology has brought about tremendous
possibilities, but at the same time, it has opened up new vulnerabilities and attack vectors …
possibilities, but at the same time, it has opened up new vulnerabilities and attack vectors …
A comprehensive survey on deep graph representation learning
Graph representation learning aims to effectively encode high-dimensional sparse graph-
structured data into low-dimensional dense vectors, which is a fundamental task that has …
structured data into low-dimensional dense vectors, which is a fundamental task that has …
[HTML][HTML] Leakage and the reproducibility crisis in machine-learning-based science
S Kapoor, A Narayanan - Patterns, 2023 - cell.com
Machine-learning (ML) methods have gained prominence in the quantitative sciences.
However, there are many known methodological pitfalls, including data leakage, in ML …
However, there are many known methodological pitfalls, including data leakage, in ML …
The role of machine learning in cybersecurity
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …
systems, and many domains already leverage the capabilities of ML. However, deployment …
Data quality for software vulnerability datasets
The use of learning-based techniques to achieve automated software vulnerability detection
has been of longstanding interest within the software security domain. These data-driven …
has been of longstanding interest within the software security domain. These data-driven …
“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Shadewatcher: Recommendation-guided cyber threat analysis using system audit records
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
Sok: Prudent evaluation practices for fuzzing
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
Kairos: Practical intrusion detection and investigation using whole-system provenance
Provenance graphs are structured audit logs that describe the history of a system's
execution. Recent studies have explored a variety of techniques to analyze provenance …
execution. Recent studies have explored a variety of techniques to analyze provenance …
Insomnia: Towards concept-drift robustness in network intrusion detection
Despite decades of research in network traffic analysis and incredible advances in artificial
intelligence, network intrusion detection systems based on machine learning (ML) have yet …
intelligence, network intrusion detection systems based on machine learning (ML) have yet …