Zobrazeno 1 - 10
of 109
pro vyhledávání: '"Gadyatskaya, Olga"'
Federated Learning (FL) heavily depends on label quality for its performance. However, the label distribution among individual clients is always both noisy and heterogeneous. The high loss incurred by client-specific samples in heterogeneous label no
Externí odkaz:
http://arxiv.org/abs/2403.16561
This article addresses the problem of automatically generating attack trees that soundly and clearly describe the ways the system can be attacked. Soundness means that the attacks displayed by the attack tree are indeed attacks in the system; clarity
Externí odkaz:
http://arxiv.org/abs/2311.13331
Multi-task reinforcement learning and meta-reinforcement learning have been developed to quickly adapt to new tasks, but they tend to focus on tasks with higher rewards and more frequent occurrences, leading to poor performance on tasks with sparse r
Externí odkaz:
http://arxiv.org/abs/2306.09742
Autor:
Kudriavtseva, Arina, Gadyatskaya, Olga
In recent years, the number of cyber attacks has grown rapidly. An effective way to reduce the attack surface and protect software is adoption of methodologies that apply security at each step of the software development lifecycle. While different me
Externí odkaz:
http://arxiv.org/abs/2211.16987
Exploit proof-of-concepts (PoCs) for known vulnerabilities are widely shared in the security community. They help security analysts to learn from each other and they facilitate security assessments and red teaming tasks. In the recent years, PoCs hav
Externí odkaz:
http://arxiv.org/abs/2210.08374
Attack trees and attack graphs are both common graphical threat models used by organizations to better understand possible cybersecurity threats. These models have been primarily seen as separate entities, to be used and researched in entirely differ
Externí odkaz:
http://arxiv.org/abs/2110.02553
Publikováno v:
In Information Sciences June 2024 672
Autor:
Dashevskyi, Stanislav, Zhauniarovich, Yury, Gadyatskaya, Olga, Pilgun, Aleksandr, Ouhssain, Hamza
Cryptojacking applications pose a serious threat to mobile devices. Due to the extensive computations, they deplete the battery fast and can even damage the device. In this work we make a step towards combating this threat. We collected and manually
Externí odkaz:
http://arxiv.org/abs/1905.02602
Autor:
Pilgun, Aleksandr, Gadyatskaya, Olga, Dashevskyi, Stanislav, Zhauniarovich, Yury, Kushniarou, Artsiom
Today, there are millions of third-party Android applications. Some of these applications are buggy or even malicious. To identify such applications, novel frameworks for automated black-box testing and dynamic analysis are being developed by the And
Externí odkaz:
http://arxiv.org/abs/1812.10729
Attack trees are considered a useful tool for security modelling because they support qualitative as well as quantitative analysis. The quantitative approach is based on values associated to each node in the tree, expressing, for instance, the minima
Externí odkaz:
http://arxiv.org/abs/1812.10754