Issue Downloads
Spacelord: Private and Secure Smart Space Sharing
Space sharing services like vacation rentals and meeting rooms are being equipped with smart devices such as cameras, door locks and many other sensors. However, the sharing of such devices poses privacy and security problems, as there is typically no ...
Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks
Graph neural networks (GNNs) have gained significant popularity as powerful deep learning methods for processing graph data. However, centralized GNNs face challenges in data-sensitive scenarios due to privacy concerns and regulatory restrictions. ...
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks that break every ML model or defenses that withstand most attacks. Unfortunately, little consideration is given to the actual feasibility of the attack or the ...
Counter Measures to Combat Money Laundering in the New Digital Age
Money Laundering has been a significant concern for governments, law enforcement agencies, and financial institutions worldwide. With the advancement of technology, money laundering techniques have evolved in the digital age, presenting new challenges for ...
A Survey on Network Attack Surface Mapping
Network services are processes running on a system with network exposure. A key activity for any network defender, penetration tester, or red team is network attack surface mapping, the act of detecting and categorizing those services through which a ...
A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center
Cybersecurity operations centers (CSOCs) protect organizations by monitoring network traffic and detecting suspicious activities in the form of alerts. The security response team within CSOCs is responsible for investigating and mitigating alerts. However,...
Web Application Security: A Pragmatic Exposé
Many individuals, organizations, and industries rely on web applications for the daily operations of their businesses. With the increasing deployment and dependence on these applications, significant attention has been directed toward developing more ...