Synthetic data generation: State of the art in health care domain

H Murtaza, M Ahmed, NF Khan, G Murtaza… - Computer Science …, 2023 - Elsevier
Recent progress in artificial intelligence and machine learning has led to the growth of
research in every aspect of life including the health care domain. However, privacy risks and …

A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities

A Alshamrani, S Myneni, A Chowdhary… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Threats that have been primarily targeting nation states and their associated entities have
expanded the target zone to include the private and corporate sectors. This class of threats …

Combating advanced persistent threats: From network event correlation to incident detection

I Friedberg, F Skopik, G Settanni, R Fiedler - Computers & Security, 2015 - Elsevier
An advanced persistent threat (also known as APT) is a deliberately slow-moving
cyberattack that is applied to quietly compromise interconnected information systems without …

APT datasets and attack modeling for automated detection methods: A review

B Stojanović, K Hofer-Schmitz, U Kleb - Computers & Security, 2020 - Elsevier
Automated detection methods for targeted cyber attacks are getting more and more
prominent. In order to test these methods properly, it is crucial to have a suitable dataset …

Making bertha see

U Franke, D Pfeiffer, C Rabe, C Knoeppel… - Proceedings of the …, 2013 - cv-foundation.org
With the market introduction of the 2014 Mercedes-Benz S-Class vehicle equipped with a
stereo camera system, autonomous driving has become a reality, at least in low speed …

Polymorphic Adversarial DDoS attack on IDS using GAN

R Chauhan, SS Heydari - 2020 International Symposium on …, 2020 - ieeexplore.ieee.org
Intrusion Detection systems are important tools in preventing malicious traffic from
penetrating into networks and systems. Recently, Intrusion Detection Systems are rapidly …

[HTML][HTML] Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection

M Landauer, M Wurzenberger, F Skopik, G Settanni… - computers & …, 2018 - Elsevier
Technological advances and increased interconnectivity have led to a higher risk of
previously unknown threats. Cyber Security therefore employs Intrusion Detection Systems …

APT beaconing detection: A systematic review

MA Talib, Q Nasir, AB Nassif, T Mokhamed… - Computers & …, 2022 - Elsevier
Abstract Advanced Persistent Threat (APT) is a type of threat that has grabbed the attention
of researchers, particularly in the industrial security field. APTs are cyber intrusions carried …

AIT cyber range: flexible cyber security environment for exercises, training and research

M Leitner, M Frank, W Hotwagner, G Langner… - Proceedings of the …, 2020 - dl.acm.org
With the evolution of threats and attacks and the speed of automation, new modern training
and learning environments are needed to support the challenges of digital organizations …

[HTML][HTML] Unraveled—A semi-synthetic dataset for Advanced Persistent Threats

S Myneni, K Jha, A Sabur, G Agrawal, Y Deng… - Computer Networks, 2023 - Elsevier
U nraveled is a novel cybersecurity dataset capturing Advanced Persistent Threat (APT)
attacks not available in the public domain. Existing cybersecurity datasets lack coherent …