Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#68 サイバーarxiv (2024-05-08)

09 May 2024

Description

本日紹介した論文の一覧 Anomaly Detection in Certificate Transparency Logs http://arxiv.org/abs/2405.05206v1 SINBAD: Saliency-informed detection of breakage caused by ad blocking http://arxiv.org/abs/2405.05196v1 Systematic Use of Random Self-Reducibility against Physical Attacks http://arxiv.org/abs/2405.05193v1 Air Gap: Protecting Privacy-Conscious Conversational Agents http://arxiv.org/abs/2405.05175v1 Gröbner Basis Cryptanalysis of Ciminion and Hydra http://arxiv.org/abs/2405.05040v1 HackCar: a test platform for attacks and defenses on a cost-contained automotive architecture http://arxiv.org/abs/2405.05023v1 Adversarial Threats to Automatic Modulation Open Set Recognition in Wireless Networks http://arxiv.org/abs/2405.05022v1 A fuzzy reward and punishment scheme for vehicular ad hoc networks http://arxiv.org/abs/2405.04892v1 A trust management framework for vehicular ad hoc networks http://arxiv.org/abs/2405.04885v1 The Need Of Trustworthy Announcements To Achieve Driving Comfort http://arxiv.org/abs/2405.04878v1 Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities http://arxiv.org/abs/2405.04874v1 Systematic review, analysis, and characterisation of malicious industrial network traffic datasets for aiding Machine Learning algorithm performance testing http://arxiv.org/abs/2405.04866v1 Enhancing Data Integrity and Traceability in Industry Cyber Physical Systems (ICPS) through Blockchain Technology: A Comprehensive Approach http://arxiv.org/abs/2405.04837v1 Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution http://arxiv.org/abs/2405.04825v1 Quantum-Edge Cloud Computing: A Future Paradigm for IoT Applications http://arxiv.org/abs/2405.04824v1 Blockchains for Internet of Things: Fundamentals, Applications, and Challenges http://arxiv.org/abs/2405.04803v1 Nearly-Optimal Consensus Tolerating Adaptive Omissions: Why is a Lot of Randomness is Needed? http://arxiv.org/abs/2405.04762v1 Large Language Models for Cyber Security: A Systematic Literature Review http://arxiv.org/abs/2405.04760v1 Honeyfile Camouflage: Hiding Fake Files in Plain Sight http://arxiv.org/abs/2405.04758v1 AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models http://arxiv.org/abs/2405.04753v1 Cryptanalysis of the SIMON Cypher Using Neo4j http://arxiv.org/abs/2405.04735v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.