Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Computer Networks, 2024 - Elsevier
Federated Learning (FL) is an emerging Artificial Intelligence (AI) paradigm enabling
multiple parties to train a model collaboratively without sharing their data. With the upcoming …

Security in Federated Learning Enabled 6g Era: A Review on Conceptual Techniques and Software Platforms Used for Research and Analysis

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Available at SSRN …, 2024 - papers.ssrn.com
Federated Learning (FL) is an emerging Artificial Intelligence (AI) paradigm that enables
multiple parties to collaboratively train a model without sharing their data. With the upcoming …

[HTML][HTML] Multi-labeling of complex, multi-behavioral malware samples

P García-Teodoro, JA Gómez-Hernández… - Computers & …, 2022 - Elsevier
The use of malware samples is usually required to test cyber security solutions. For that, the
correct typology of the samples is of interest to properly estimate the exhibited performance …

[HTML][HTML] Decision support model for effects estimation and proportionality assessment for targeting in cyber operations

C Maathuis, W Pieters, J van den Berg - Defence Technology, 2021 - Elsevier
Cyber operations are relatively a new phenomenon of the last two decades. During that
period, they have increased in number, complexity, and agility, while their design and …

A modified McCumber cube as a basis for a taxonomy of cyber attacks

C Easttom, W Butler - 2019 IEEE 9th Annual Computing and …, 2019 - ieeexplore.ieee.org
There currently exist taxonomies for malware, however malware is only one type of attack.
Malware taxonomies are usually targeted at a specific scenario and are not easily …

Complexity Science and Cyber Operations: A Literature Survey

B Becote, BP Rimal - Complex System Modeling and …, 2023 - ieeexplore.ieee.org
Complexity science is an interdisciplinary scientific field that analyzes systems as holistic
entities consisting of characteristics beyond the sum of a system's individual elements. This …

European Cybersecurity Certification Schemes and cybersecurity in the EU internal market

DD Stewart Ferguson - International Cybersecurity Law Review, 2022 - Springer
The principal question addressed by this paper is: how adequate are the minimum security
objectives of the European Union Cybersecurity Act (Regulation (EU) 2019/881) in assisting …

Empirical study on cyber range capabilities, interactions and learning features

K Aaltola - Digital Transformation, Cyber Security and Resilience …, 2021 - Springer
Emerging technologies and the globalization require constant investment in people and
their performance in actual and virtual environments. New technologies such as …

Pricing cyber-insurance for systems via maturity models

H Skeoch, D Pym - arXiv preprint arXiv:2302.04734, 2023 - arxiv.org
Pricing insurance for risks associated with information technology systems presents a
complex modelling challenge, combining the disciplines of operations management …

The complexity in application of modeling and simulation for cyber physical systems engineering

S Mittal, A Tolk - … Challenges in Cyber Physical Systems: Using …, 2019 - books.google.com
Cyber Physical Systems (CPS), according to a definition provided by National Science
Foundation (NSF) are hybrid networked cyber and engineered physical elements co …