For system logs to aid in security investigations, they must be beyond the reach of the adversary. Unfortunately, attackers that have escalated privilege on a host are typically able …
Due to the complexity of modern computer systems, novel and unexpected behaviors frequently occur. Such deviations are either normal occurrences, such as software updates …
KP Soman, M Alazab, S Sriram - Authorea Preprints, 2023 - techrxiv.org
A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security Page 1 P osted on 5 Jan 2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/tech rxiv.11473377.v1 …
Kernel traces are sequences of low-level events comprising a name and multiple arguments, including a timestamp, a process id, and a return value, depending on the event …
H Gantikow, C Reich, M Knahl, N Clarke - 2019 - pearl.plymouth.ac.uk
In order to further support the secure operation of containerized environments and to extend already established security measures, we propose a rule-based security monitoring, which …
In recent years, distributed systems have become increasingly complex as they grow in both scale and functionality. Such complexity makes these systems prone to performance …
TK Rao, N Darapaneni, AR Paduri, A Kumar… - Proceedings of the 2023 …, 2023 - dl.acm.org
Insider threats refer to cyber-attacks originating from within an organization that can cause significant damage, such as intellectual property theft, sabotage, and sensitive data …
The introduction of transformers has been an important breakthrough for AI research and application as transformers are the foundation behind Generative AI. A promising …
Electrostatic discharge (ESD) into a functioning system can cause temporary upsets–soft failures. Subtle soft failures can reduce the reliability of system and cannot be detected by …