Showing 21 - 35 results of 35 for search 'threat intelligence', query time: 0.06s Refine Results
  1. 21

    Stealthy and robust glitch injection attack on deep learning accelerator for target with variational viewpoint by Liu, Wenye, Chang, Chip-Hong, Zhang, Fan

    Published 2021
    “…The advocacy of 'model once, run optimized anywhere' paradigm introduces potential new security threat to edge intelligence that is methodologically different from the well-known adversarial examples. …”
    Get full text
    Journal Article
  2. 22

    Security Orchestration, Automation, and Response for Security Analysts : Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture / by Kovacevic, Benjamin, author 656337, Packt Publishing (Online service) 656336

    Published 2023
    “…Next, you'll learn how SOAR works and what its benefits are, including optimized threat intelligence, incident response, and utilizing threat hunting in investigations. …”
    Get full text
    Get full text
    software, multimedia
  3. 23

    Cognizant multitasking in multiobjective multifactorial evolution : MO-MFEA-II by Bali, Kavitesh Kumar, Gupta, Abhishek, Ong, Yew-Soon, Tan, Puay Siew

    Published 2021
    “…Thus, in the absence of any prior knowledge about the relationships between optimization functions, a threat of predominantly negative (harmful) transfer prevails. …”
    Get full text
    Journal Article
  4. 24

    Enhancement of a Stepping Stone Detection Algorithm Using Data Mining and Associate Rule Techniques (S/O: 12896) by Omar, Mohd Nizam, Ghazali, Osman, Daud, Ali Yusny, Azzali, Fazli

    Published 2020
    “…Less accurate detection and Active Perturbation Attack (APA) is the most problem that becomes a threat to SSD approach itself. By using hybrid approach to increase an accurate detection and intelligent technique to overcome the APA problem, this research proposed the combination of hybrid and intelligent SSD to as create Hybrid Intelligent SSD (HI-SSD). …”
    Get full text
    Monograph
  5. 25
  6. 26

    Malicious JavaScript detection web service by Peng, Lunan

    Published 2016
    “…Once users access to them without the strong protection from anti-virus products, users’ computers might be harmed and their information might be stolen. One of the biggest threats in these websites is the Malicious JavaScript. …”
    Get full text
    Final Year Project (FYP)
  7. 27

    Constructing envelopes: how institutional custodians can tame disruptive algorithms by Marti, E, Lawrence, TB, Steele, C

    Published 2024
    “…The infusion of algorithms into organizational fields—accelerated by advances in artificial intelligence—can have disruptive effects that trigger defensive responses. …”
    Journal article
  8. 28

    Fault-injection based attacks and countermeasure on deep neural network accelerators by Liu, Wenye

    Published 2021
    “…This extra degree of manipulability offers more space of research exploration on the security threats, attack surfaces and countermeasures on modern DNN accelerators. …”
    Get full text
    Thesis-Doctor of Philosophy
  9. 29

    Evolution of software-defined networking foundations for IoT and 5G mobile networks by Kumar, Sunil

    Published 2020
    “…The book explores the threats to 5G and IoT and how to implement effective security architecture for them. …”
    Book
  10. 30

    Novel denial-of-service attacks against cloud-based multi-robot systems by Xu, Yuan, Deng, Gelei, Zhang, Tianwei, Qiu, Han, Bao, Yungang

    Published 2022
    “…However, the introduction of cloud servers to multi-robot systems can also incur potential Denial-of-Service (DoS) threats, where an adversary can utilize the shared cloud resources to degrade or bring down the robot systems. …”
    Get full text
    Journal Article
  11. 31

    Voice conversion with parallel/non-parallel data and synthetic speech detection by Tian, Xiaohai

    Published 2019
    “…On the other hand, voice conversion also presents a threat to Automatic Speaker Verification (ASV) systems. …”
    Get full text
    Get full text
    Thesis
  12. 32
  13. 33
  14. 34

    Evaluating & enhancing deep learning systems via out-of-distribution detection by Christopher, Berend David

    Published 2022
    “…Finally, we introduce OOD defense approaches against two novel DL threats which fully evade traditional defenses. …”
    Get full text
    Thesis-Doctor of Philosophy
  15. 35

    Advanced data analytics for future smart grid stability assessment by Ren, Chao

    Published 2022
    “…The outcomes of this Ph.D. research will enable a more secure, intelligent, and knowledge-transparent future of the next-generation smart grid. …”
    Get full text
    Thesis-Doctor of Philosophy