MC
M. Conti
316 records found
1
...
Federated Learning (FL) has recently arisen as a revolutionary approach to collaborative training Machine Learning models. According to this novel framework, multiple participants train a global model collaboratively, coordinating with a central aggregator without sharing their l
...
Temporal dynamics of coordinated online behavior
Stability, archetypes, and influence
Large-scale online campaigns, malicious or otherwise, require a significant degree of coordination among participants, which sparked interest in the study of coordinated online behavior. State-of-the-art methods for detecting coordinated behavior perform static analyses, disregar
...
PETRAK
A solution against DDoS attacks in vehicular networks
In recent years, the frequently reported incidents of Distributed Denial of Service assaults on vehicular networks in various countries have made researchers find new protective solutions. DDoS attacks can propagate through the charging points for electric vehicles in a charging
...
EDIT
A data inspection tool for smart contracts temporal behavior modeling and prediction
Modeling and predicting the behavior of nodes and users in blockchains provide opportunities for business strategy optimization. Indeed, the number of interactions of a node is strictly related to its balance and its prediction may be used for analytics purposes and investment st
...
Federated Learning (FL) represents the de facto approach for distributed training of machine learning models. Nevertheless, researchers have identified several security and privacy FL issues. Among these, the lack of anonymity exposes FL to linkability attacks, representing a ris
...
RANGO
A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems
Video surveillance systems provide means to detect the presence of potentially malicious drones in the surroundings of critical infrastructures. In particular, these systems collect images and feed them to a deep-learning classifier able to detect the presence of a drone in the i
...
SPARQ
SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches
Software-defined networking (SDN), enabled by high-performance programmable switches, offers a new avenue to counter cyber attacks. Programmable switches offer the ability to customize and conduct in-depth packet analysis, thus providing efficient and timely responses to DDoS att
...
OSTIS
A novel Organization-Specific Threat Intelligence System
With the increasing complexity and frequency of cyber attacks, organizations recognize the need for a proactive and targeted approach to safeguard their digital assets and operations. Every industry faces a distinct array of threats shaped by factors such as its industrial object
...
Augmenting Security and Privacy in the Virtual Realm
An Analysis of Extended Reality Devices
We present a device-centric analysis of security and privacy attacks and defenses on extended reality (XR) devices. We present future research directions and propose design considerations to help ensure the security and privacy of XR devices.@en
In the past decades, the rise of artificial intelligence has given us the capabilities to solve the most challenging problems in our day-to-day lives, such as cancer prediction and autonomous navigation. However, these applications might not be reliable if not secured against adv
...
SFC-NIDS
A sustainable and explainable flow filtering based concept drift-driven security approach for network introspection
The evolving behavior of the attacks may affect the decision boundaries of the trained machine learning models. The issue has not been well investigated, especially with hypervisor-based security solutions where virtual machine (VM)’s network artifacts are introspected and analyz
...
FaultGuard
A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids
Predicting and classifying faults in electricity networks is crucial for uninterrupted provision and keeping maintenance costs at a minimum. Thanks to the advancements in the field provided by the smart grid, several data-driven approaches have been proposed in the literature to
...
SYNTROPY
TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy
The rapidly evolving landscape of network security, particularly in Software Defined Networks (SDNs), presents a critical need for efficient and adaptive DDoS attack detection methods, especially in the face of TCP SYN DDoS attacks. These attacks pose significant threats to netwo
...
Hyperloop is among the most prominent future transportation systems. It involves novel technologies to allow traveling at a maximum speed of 1220km/h while guaranteeing sustainability. Due to the system's performance requirements and the critical infrastructure it represents, its
...
VAIDANSHH
Adaptive DDoS detection for heterogeneous hosts in vehicular environments
Vehicular networks are vulnerable to Distributed Denial of Service (DDoS), an extension of a Denial of Service (DoS) attack. The existing solutions for DDoS detection in vehicular networks use various Machine Learning (ML) algorithms. However, these algorithms are applicable only
...
SoK
Visualization-based Malware Detection Techniques
Cyber attackers leverage malware to infiltrate systems, steal sensitive data, and extort victims, posing a significant cybersecurity threat. Security experts address this challenge by employing machine learning and deep learning approaches to detect malware precisely, using stati
...
Work-in-Progress: Crash Course
Can (Under Attack) Autonomous Driving Beat Human Drivers?
Autonomous driving is a research direction that has gained enormous traction in the last few years thanks to advancements in Artificial Intelligence (AI). Depending on the level of independence from the human driver, several studies show that Autonomous Vehicles (AVs) can reduce
...
AALMOND
Decentralized Adaptive Access Control of Multiparty Data Sharing in Industrial Networks
Access control (AC) is an important security parameter in industrial networks; a mismanaged AC system leads to security breaches. The existing security solutions significantly consider the AC methods in the Industrial Internet of Things (IIoT); however, falsified identity can byp
...
EVScout2.0
Electric Vehicle Profiling through Charging Profile
Electric Vehicles (EVs) represent a green alternative to traditional fuel-powered vehicles. To enforce their widespread use, both the technical development and the security of users shall be guaranteed. Users' privacy represents a possible threat that impairs the adoption of EVs.
...