IRIS: a Record and Replay Framework to Enable Hardware-assisted Virtualization Fuzzing. (arXiv:2303.12817v1 [cs.CR])
Nowadays, industries are looking into virtualization as an effective means to build safe applications, thanks to the isolation it can provide among virtual machines (VMs) running on the same hardware.…
Feature Reduction Method Comparison Towards Explainability and Efficiency in Cybersecurity Intrusion Detection Systems. (arXiv:2303.12891v1 [cs.LG])
In the realm of cybersecurity, intrusion detection systems (IDS) detect and prevent attacks based on collected computer and network data. In recent research, IDS models have been constructed using machine…
Feature Reduction Method Comparison Towards Explainability and Efficiency in Cybersecurity Intrusion Detection Systems. (arXiv:2303.12891v1 [cs.LG])
In the realm of cybersecurity, intrusion detection systems (IDS) detect and prevent attacks based on collected computer and network data. In recent research, IDS models have been constructed using machine…
Stability is Stable: Connections between Replicability, Privacy, and Adaptive Generalization. (arXiv:2303.12921v1 [cs.LG])
The notion of replicable algorithms was introduced in Impagliazzo et al. [STOC ’22] to describe randomized algorithms that are stable under the resampling of their inputs. More precisely, a replicable…
Stability is Stable: Connections between Replicability, Privacy, and Adaptive Generalization. (arXiv:2303.12921v1 [cs.LG])
The notion of replicable algorithms was introduced in Impagliazzo et al. [STOC ’22] to describe randomized algorithms that are stable under the resampling of their inputs. More precisely, a replicable…
Managing Cyber Risk, a Science in the Making. (arXiv:2303.12939v1 [cs.CR])
Not a day goes by without news about a cyber attack. Fear spreads out and lots of wrong ideas circulate. This survey aims at showing how all these uncertainties about…
Managing Cyber Risk, a Science in the Making. (arXiv:2303.12939v1 [cs.CR])
Not a day goes by without news about a cyber attack. Fear spreads out and lots of wrong ideas circulate. This survey aims at showing how all these uncertainties about…
Cryptocurrency wallets: assessment and security. (arXiv:2303.12940v1 [cs.CR])
Digital wallet as a software program or a digital device allows users to conduct various transactions. Hot and cold digital wallets are considered as two types of this wallet. Digital…
Cryptocurrency wallets: assessment and security. (arXiv:2303.12940v1 [cs.CR])
Digital wallet as a software program or a digital device allows users to conduct various transactions. Hot and cold digital wallets are considered as two types of this wallet. Digital…
Stability is Stable: Connections between Replicability, Privacy, and Adaptive Generalization. (arXiv:2303.12921v1 [cs.LG])
The notion of replicable algorithms was introduced in Impagliazzo et al. [STOC ’22] to describe randomized algorithms that are stable under the resampling of their inputs. More precisely, a replicable…