Results 1 to 10 of about 91,200 (106)

Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security [PDF]

open access: yesConference on Computer and Communications Security, 2022
A transaction fee mechanism (TFM) is an essential component of a blockchain protocol. However, a systematic evaluation of the real-world impact of TFMs is still absent.
Yulin Liu   +5 more
semanticscholar   +1 more source

Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations [PDF]

open access: yesUSENIX Security Symposium, 2023
The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be"morally good"or at least"morally allowed / acceptable". Among philosophy's contributions
Tadayoshi Kohno, Y. Acar, Wulf Loh
semanticscholar   +1 more source

SoK: Explainable Machine Learning for Computer Security Applications [PDF]

open access: yesEuropean Symposium on Security and Privacy, 2022
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive ...
A. Nadeem   +6 more
semanticscholar   +1 more source

UNSW‐NB15 computer security dataset: Analysis through visualization [PDF]

open access: yesSecurity and Privacy, 2021
Class imbalance refers to a major issue in data mining where data with unequal class distribution can deteriorate classification performance. Although it alone affects the performance of the classifiers, the joint‐effect of class imbalance and overlap is
Zeinab Zoghi, G. Serpen
semanticscholar   +1 more source

Lessons Learned on Machine Learning for Computer Security

open access: yesIEEE Security and Privacy, 2023
We identify 10 generic pitfalls that can affect the experimental outcome of AI driven solutions in computer security. We find that they are prevalent in the literature and provide recommendations for overcoming them in the future.
Daniel Arp   +7 more
semanticscholar   +1 more source

Impact of Capture The Flag (CTF)-style vs. Traditional Exercises in an Introductory Computer Security Class

open access: yesAnnual Conference on Innovation and Technology in Computer Science Education, 2022
The importance of possessing hands-on skills in addition to theoretical knowledge for cybersecurity researchers and professionals cannot be overstated.
Stephen V. Cole
semanticscholar   +1 more source

A Computer Security System for Cloud Computing Based on Encryption Technique

open access: yesComputer Engineering and Applications Journal, 2021
In recent years, progressively data proprietors have embraced cloud storage service, by which they will subcontract their data to the cloud server to significantly reduce the local storage overhead, due to the rapid growth in the cloud computing market ...
A. Daniel   +4 more
semanticscholar   +1 more source

Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks [PDF]

open access: yes2024 IEEE Security and Privacy Workshops (SPW), 2023
Recent advances in instruction-following large language models (LLMs) have led to dramatic improvements in a range of NLP tasks. Unfortunately, we find that the same improved capabilities amplify the dual-use risks for malicious purposes of these models.
Daniel Kang   +5 more
semanticscholar   +1 more source

Application of Data Encryption Technology in Computer Network Information Security

open access: yesSecurity and Communication Networks, 2022
In order to solve the partial optimization problems of the RSA algorithm in computer network security, a method of RSA algorithm optimization based on data encryption was proposed.
Lifeng Li
semanticscholar   +1 more source

Internet-of-Things-Based Suspicious Activity Recognition Using Multimodalities of Computer Vision for Smart City Security

open access: yesSecurity and Communication Networks, 2022
Automatic human activity recognition is one of the milestones of smart city surveillance projects. Human activity detection and recognition aim to identify the activities based on the observations that are being performed by the subject.
A. Rehman   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy