Smart grid cyber-physical situational awareness of complex operational technology attacks: A review

MN Nafees, N Saxena, A Cardenas, S Grijalva… - ACM Computing …, 2023 - dl.acm.org
The smart grid (SG), regarded as the complex cyber-physical ecosystem of infrastructures,
orchestrates advanced communication, computation, and control technologies to interact …

A survey on ethereum systems security: Vulnerabilities, attacks, and defenses

H Chen, M Pendleton, L Njilla, S Xu - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Blockchain technology is believed by many to be a game changer in many application
domains. While the first generation of blockchain technology (ie, Blockchain 1.0) is almost …

Deepwukong: Statically detecting software vulnerabilities using deep graph neural network

X Cheng, H Wang, J Hua, G Xu, Y Sui - ACM Transactions on Software …, 2021 - dl.acm.org
Static bug detection has shown its effectiveness in detecting well-defined memory errors, eg,
memory leaks, buffer overflows, and null dereference. However, modern software systems …

Vuldeepecker: A deep learning-based system for vulnerability detection

Z Li, D Zou, S Xu, X Ou, H Jin, S Wang, Z Deng… - arXiv preprint arXiv …, 2018 - arxiv.org
The automatic detection of software vulnerabilities is an important research problem.
However, existing solutions to this problem rely on human experts to define features and …

Sysevr: A framework for using deep learning to detect software vulnerabilities

Z Li, D Zou, S Xu, H Jin, Y Zhu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The detection of software vulnerabilities (or vulnerabilities for short) is an important problem
that has yet to be tackled, as manifested by the many vulnerabilities reported on a daily …

A review of recent approaches on wrapper feature selection for intrusion detection

J Maldonado, MC Riff, B Neveu - Expert Systems with Applications, 2022 - Elsevier
In this paper, we present a review of recent advances in wrapper feature selection
techniques for attack detection and classification, applied in intrusion detection area. Due to …

Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence

V Mavroeidis, S Bromander - 2017 European Intelligence and …, 2017 - ieeexplore.ieee.org
Threat intelligence is the provision of evidence-based knowledge about existing or potential
threats. Benefits of threat intelligence include improved efficiency and effectiveness in …

Vuldeelocator: a deep learning-based fine-grained vulnerability detector

Z Li, D Zou, S Xu, Z Chen, Y Zhu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Automatically detecting software vulnerabilities is an important problem that has attracted
much attention from the academic research community. However, existing vulnerability …

Adversarial deep ensemble: Evasion attacks and defenses for malware detection

D Li, Q Li - IEEE Transactions on Information Forensics and …, 2020 - ieeexplore.ieee.org
Malware remains a big threat to cyber security, calling for machine learning based malware
detection. While promising, such detectors are known to be vulnerable to evasion attacks …

[HTML][HTML] A comprehensive model of information security factors for decision-makers

R Diesch, M Pfaff, H Krcmar - Computers & Security, 2020 - Elsevier
Decision-making in the context of organizational information security is highly dependent on
various information. For information security managers, not only relevant information has to …