Research on technology for detection of internet-based cybercrime and active collection·tracking·response ; Intelligent web crawler-based collection of URLs and evidence from illegal/harmful websites ; Advancement of AI/XAI-based illegal/harmful website classification and learning models ; Creation network map for track large-scale cybercrime groups and operators
The scope of the Research Topic focuses on both Cyber Security, Malware Detection and Prevention Mechanisms, Software and Hardware Security, the IoT and Critical Cyber Infrastructures...
About this Research Topic Manuscript Submission Deadline 31 March 2024 Guidelines A cyber-physical system (CPS) aims at integrating the cyberspace (e.g., Web, Clouds, IoT) with vital...
About this Research Topic Submission closed. Guidelines In the age of digitization, cyber security has become a major... Frontiers Research Topics With their unique mixes of varied...
Research Objectives ; Ensure safe use and development of domestic ICT services via application of state-of-the-art software security technologies ; Develop foundational techniques for software vulnerability detection and analysis to prevent cyber attacks ; Develop vulnerability analysis methodologies for assessing security in next generation software / platform (artificial intelligence, cloud, and blockchain) ; Software safety analysis through reverse-engineering binaries
Research Objectives ; Secure quality training data for cybersecurity domain via AI/XAI-based data augmentation, synthesis, and valuation ; To ensure safety of AI models via preventing and analyzing adverse effects of AI models ; Efficient and effective AI trust verification via automated diagnosis and analysis of security vulnerabilities in AI models
The scope of the Research Topic focuses on both Cyber Security, Malware Detection and Prevention Mechanisms, Software and Hardware Security, the IoT and Critical Cyber Infrastructures...
Automated analysis of security vulnerabilities in blockchain platform ; Project : Information protection core source technology development project ; Task : Automated analysis of security vulnerabilities in blockchain platform ; Client : Ministry of Science and ICT > Institute for Information & Communication Technology Planning & Evaluation (IITP)
What researchers are learning about GenAI and cyber security AI is the hottest topic in the universe. Pair AI with cyber security and the possibilities
Featured Research ; Essays · “Defend Forward” And Sovereignty · April 29, 2021 · By Jack Goldsmith, Alex Loomis · via Aegis Paper Series ; Articles · The Power Of Beliefs In US Cyber Strategy: The Evolving Role Of Deterrence, Norms, And Escalation · Cyberspace's role in military power is vociferously debated. But how do these ideas manifest in cyber strategy? In this article, we trace the development of ideas about military cyber power, with… · March 31, 2023 · By Jacquelyn...