🚨 Call for Papers - Trustworthy AI for Cybersecurity (TAIC25 Workshop) 🚨 📍 Co-located with ITASEC25 | Bologna, Italy | February 3–8, 2025 The Sec4AI4Sec project is thrilled to announce the upcoming Trustworthy AI for Cybersecurity (TAIC25) Workshop! This event delves into cutting-edge topics, combining the power of Trustworthy AI and AI for Cybersecurity, to address critical challenges such as: 🔹 Trustworthy AI: Enhancing model and algorithm security, advancing attack/defense techniques, explainability for transparency, and fairness analysis. 🔹 AI for Cybersecurity: Leveraging AI for spam, malware, botnet detection, and uncovering vulnerabilities in software applications. 📝 Submit Your Papers ✅ Submission Deadline: December 9, 2024 📖 Call for Papers: https://lnkd.in/dbefPv-h 📚 More Info: https://lnkd.in/dRi5z8Dz ✨ Organizers: @Giorgio Piras | Maura Pintor | Emanuele Iannone | Katja Tuma | Battista Biggio | Fabio Massacci We’re looking forward to your contributions and engaging discussions at TAIC25! #CallForPapers #TAIC25 #TrustworthyAI #Cybersecurity #ITASEC25
Sec4AI4Sec’s Post
More Relevant Posts
-
Article publication: WeChat/Whatsapp: +86 135 4503 2449 qq: 1621002814;Submission: [email protected]
【Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions】 Full article: https://lnkd.in/gMMXNw9A (Authored by Maryam Roshanaei, et al., from Pennsylvania State University, USA.) The cyber threat landscape is characterized by its constant evolution and increasing complexity. The integration of #Artificial_Intelligence (AI) and #Machine_Learning (ML) into cybersecurity is a significant step forward in the fight against increasingly sophisticated cyber threats. This paper explores the crucial role of AI and ML in enhancing #cybersecurity defenses against increasingly sophisticated cyber threats, while also highlighting the new vulnerabilities introduced by these technologies, and examines the dual-edged nature of AI and ML in cybersecurity through a comprehensive analysis that includes historical trends, technological evaluations, and predictive modeling. #Data_Privacy #Ethical_Standards Submission link of new manuscripts: https://lnkd.in/gAtYE2Sp
To view or add a comment, sign in
-
-
🔒 Unlocking Insights: Interdisciplinary Cybersecurity Lunch Talks Series 🔒 When: 28th November, 12:00-13:00 Join our last lunch talk for this year, where cybersecurity researchers converge to share, discuss, and refine their work. Explore interdisciplinary perspectives, present your projects, and foster connections in this collaborative environment. Elevate your understanding and contribute to shaping the future of cybersecurity. AI Threat Modeling - With Jan von der Assen Cybersecurity and Artificial Intelligence (AI) have received much attention in recent years. This talk by Jan von der Assen will introduce threat modeling and discuss how it can be applied to AI-based systems. In addition, we will summarize what we learned from securing real-world AI systems. Here you can join the event: https://lnkd.in/dpiHi9k3 #Cybersecurity #Research #Interdisciplinary #LunchTalks #CybersecurityCommunity
To view or add a comment, sign in
-
I'm thrilled to announce the release of my latest research paper titled "AI in Cyberspace." In this paper, I dive deep into the ever-evolving landscape of cybersecurity challenges and explore how artificial intelligence can be a game-changer in preventing cyberattacks. Highlights include: Detailed analysis of current cybersecurity threats How AI technology can predict and mitigate these threats The integration of AI with human insight for robust defense mechanisms Real-world examples and case studies As our digital world grows increasingly complex, leveraging AI for cybersecurity is not just an option—it's a necessity. I'm excited to share my findings and contribute to the ongoing conversation on securing our cyberspace. #Cybersecurity #AI #Research #TechInnovation #DigitalSecurity
To view or add a comment, sign in
-
Excited to share that my PhD advisee Maraz Mia just presented our research paper virtually at the Machine Learning for Cybersecurity (MLC 2024) workshop co-located with IEEE ICDM 2024 in Abu Dhabi, UAE. Thanks to all the co-authors. The paper is titled "Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection". In this research, we have proposed a new SHAP visualization approach to better aid the analyst on detecting misclassification in intrusion detection scenarios for reliable decision-making. A preprint version is available to read in the arXiv, if you are further interested in the topic. In the ReACT (Resilient AI-enabled Cybersecurity and Trustworthiness) lab at Tennessee Tech, we will continue to do exciting research in both "AI-enabled Security" and "Security & Reliability of AI". #cybersecurity #research #publication #decisionmaking #usability #XAI #TNTECH #ICDM2024 #MLC
Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection
arxiv.org
To view or add a comment, sign in
-
In the previous issue of FeedForward Magazine Vasanthan Ramakrishnan from CIET delves into the opportunities, challenges, and implications of this transformative technology. The article highlights Generative AI's potential for threat detection, cybersecurity training, and emerging use cases. It showcases how these models can enhance defense capabilities, from simulating attacks to automating adaptive strategies. However, the dual-edge nature of Generative AI is also acknowledged. The paper examines how malicious actors can leverage these powerful models to generate sophisticated cyber threats, create deceptive content, and launch adversarial attacks. Case studies on adversarial attacks, DeepFakes, and Generative AI in intrusion detection illustrate the real-world implications. The article also explores the economic and ethical impact, emphasizing the need for proactive defense, ethical considerations, and collaboration between AI and cybersecurity communities. Read the full article: https://lnkd.in/gpdNiTHB Share your perspectives on harnessing the power of Generative AI while mitigating its risks in cybersecurity. Submissions for future @FeedForward Magazine issues are also invited from researchers, industry experts, and thought leaders. Contribute your groundbreaking work at https://lnkd.in/g49jy8-p . #GenerativeAI #Cybersecurity #ThreatDetection #CyberTraining #AdversarialAttacks #DeepFakes #FeedForwardMagazine #IEEEComputer
To view or add a comment, sign in
-
-
🎉Excited to Announce Our Recent Publication!🎉 Thrilled to share that our research paper titled "Auto Encoder Based Malware Detection Using Machine Learning" has been published in the Journal of Emerging Technologies and Innovative Research (JETIR). This research, which I worked on with Neha B R, Nisarga Raj D focuses on using autoencoders to enhance malware detection using machine learning, introducing innovative methods to improve threat detection accuracy. We’ve also received the official certificate for this publication. 🏆 Check out the full paper here: [Paper Link](https://lnkd.in/gS24PiXG) I would like to thank our beloved HOD Dr. Rajesh K S and our principal Dr. Balakrishna Rayanki for helping us in publishing this paper. Looking forward to future collaborations and continuing our journey in cybersecurity and AI/ML! #cybersecurity #malwareanalysis #research #machinelearning #malwaredetection #AI #publication #innovation
To view or add a comment, sign in
-
-
【Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions】 Full article: https://lnkd.in/gaj-KZ5U (Authored by Maryam Roshanaei, et al., from Pennsylvania State University, USA.) The cyber threat landscape is characterized by its constant evolution and increasing complexity. The integration of #Artificial_Intelligence (AI) and #Machine_Learning (ML) into cybersecurity is a significant step forward in the fight against increasingly sophisticated cyber threats. This paper explores the crucial role of AI and ML in enhancing #cybersecurity defenses against increasingly sophisticated cyber threats, while also highlighting the new vulnerabilities introduced by these technologies, and examines the dual-edged nature of AI and ML in cybersecurity through a comprehensive analysis that includes historical trends, technological evaluations, and predictive modeling. #Data_Privacy #Ethical_Standards
To view or add a comment, sign in
-
-
I am thrilled to announce that my research paper, titled "An In-depth Analysis of Intrusion Detection Systems with an Emphasis on Multi-Access Edge Computing and Machine Learning," has been accepted as a book chapter in the forthcoming publication by Routledge Taylor & Francis, CRC Press (based in London and New York). The book, titled "Digital Defence: Harnessing the Power of Artificial Intelligence for Cybersecurity and Digital Forensics," is set to be published in April 2025. It explores cutting-edge advancements at the intersection of AI, cybersecurity, and digital forensics—and I am honored to contribute to this groundbreaking work. Stay tuned for the release! You can learn more about the book here. https://lnkd.in/dE-adWpr #Cybersecurity #ArtificialIntelligence #MachineLearning #DigitalForensics #AcademicPublishing #Routledge #CRCPress #Research
To view or add a comment, sign in
-
Just finished Leveraging AI for Threat Intelligence! The short course explored using AI in various areas: planning and collection (e.g., web scraping, enhancing collection volume), processing and pattern recognition (e.g., aggregating TTPs, predictive threat intelligence), threat intelligence (e.g., language analysis, malware identification), and dissemination and feedback. I found the segment on AI for threat intelligence, particularly malware analysis, most fascinating. By uploading malware code into AI, you can understand its functions. Some malware includes anti-analysis mechanisms to detect virtual environments and alter its behaviour, but AI can bypass these techniques, making analysis more efficient and accurate. Note: Ensure the AI tool permits such analysis before proceeding. Thanks to Karla Reffold for putting this together. Check it out: https://lnkd.in/eBQsPxBW #AI #threatintelligence #cybersecurity #malwareanalysis
To view or add a comment, sign in
Cefriel USI USI Università della Svizzera italiana FrontEndART Software Ltd. SAP Pluribus One Thales Vrije Universiteit Amsterdam (VU Amsterdam), UniTrento DISI