サイバーarXiv

#68 サイバーarxiv (2024-05-08)


Listen Later

本日紹介した論文の一覧

  • Anomaly Detection in Certificate Transparency Logs

    http://arxiv.org/abs/2405.05206v1

  • SINBAD: Saliency-informed detection of breakage caused by ad blocking

    http://arxiv.org/abs/2405.05196v1

  • Systematic Use of Random Self-Reducibility against Physical Attacks

    http://arxiv.org/abs/2405.05193v1

  • Air Gap: Protecting Privacy-Conscious Conversational Agents

    http://arxiv.org/abs/2405.05175v1

  • Gröbner Basis Cryptanalysis of Ciminion and Hydra

    http://arxiv.org/abs/2405.05040v1

  • HackCar: a test platform for attacks and defenses on a cost-contained

    automotive architecture
    http://arxiv.org/abs/2405.05023v1

  • Adversarial Threats to Automatic Modulation Open Set Recognition in

    Wireless Networks
    http://arxiv.org/abs/2405.05022v1

  • A fuzzy reward and punishment scheme for vehicular ad hoc networks

    http://arxiv.org/abs/2405.04892v1

  • A trust management framework for vehicular ad hoc networks

    http://arxiv.org/abs/2405.04885v1

  • The Need Of Trustworthy Announcements To Achieve Driving Comfort

    http://arxiv.org/abs/2405.04878v1

  • Critical Infrastructure Protection: Generative AI, Challenges, and

    Opportunities
    http://arxiv.org/abs/2405.04874v1

  • Systematic review, analysis, and characterisation of malicious

    industrial network traffic datasets for aiding Machine Learning algorithm
    performance testing
    http://arxiv.org/abs/2405.04866v1

  • Enhancing Data Integrity and Traceability in Industry Cyber Physical

    Systems (ICPS) through Blockchain Technology: A Comprehensive Approach
    http://arxiv.org/abs/2405.04837v1

  • Explanation as a Watermark: Towards Harmless and Multi-bit Model

    Ownership Verification via Watermarking Feature Attribution
    http://arxiv.org/abs/2405.04825v1

  • Quantum-Edge Cloud Computing: A Future Paradigm for IoT Applications

    http://arxiv.org/abs/2405.04824v1

  • Blockchains for Internet of Things: Fundamentals, Applications, and

    Challenges
    http://arxiv.org/abs/2405.04803v1

  • Nearly-Optimal Consensus Tolerating Adaptive Omissions: Why is a Lot of

    Randomness is Needed?
    http://arxiv.org/abs/2405.04762v1

  • Large Language Models for Cyber Security: A Systematic Literature Review

    http://arxiv.org/abs/2405.04760v1

  • Honeyfile Camouflage: Hiding Fake Files in Plain Sight

    http://arxiv.org/abs/2405.04758v1

  • AttacKG+:Boosting Attack Knowledge Graph Construction with Large

    Language Models
    http://arxiv.org/abs/2405.04753v1

  • Cryptanalysis of the SIMON Cypher Using Neo4j

    http://arxiv.org/abs/2405.04735v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu