Search Results

U-PoT: A Honeypot Framework for UPnP-Based IoT Devices

1 code implementation13 Dec 2018

Specifically, we introduce U-PoT: a novel honeypot framework for capturing attacks on IoT devices that use Universal Plug and Play (UPnP) protocol.

Cryptography and Security

Synthesizing Event-centric Knowledge Graphs of Daily Activities Using Virtual Space

1 code implementation30 Jul 2023

Artificial intelligence (AI) is expected to be embodied in software agents, robots, and cyber-physical systems that can understand the various contextual information of daily life in the home environment to support human behavior and decision making in various situations.

Decision Making Embodied Question Answering +2

Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version)

1 code implementation21 Sep 2020

The obtained results show that all the evaluated PHM models are vulnerable to adversarial attacks and can cause a serious defect in the remaining useful life estimation.

Deep Learning Management

AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation

1 code implementation4 Oct 2023

In this paper, we introduce AGIR (Automatic Generation of Intelligence Reports), a transformative Natural Language Generation tool specifically designed to address the pressing challenges in the realm of CTI reporting.

Hallucination Text Generation

RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports

1 code implementation20 Jul 2023

Therefore, managing risk exposure and cybersecurity strategies is essential for digitized companies that want to survive in competitive markets.

Management

ACTISM: Threat-informed Dynamic Security Modelling for Automotive Systems

1 code implementation30 Nov 2024

Evolving cybersecurity threats in complex cyber-physical systems pose significant risks to system functionality and safety.

Cryptography and Security

Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks

no code implementations12 Aug 2019

The interconnectivity of cyber and physical systems and Internet of things has created ubiquitous concerns of cyber threats for enterprise system managers.

Management

Cannot find the paper you are looking for? You can Submit a new open access paper.