Search Results for author: Burkhard Stiller

Found 9 papers, 2 papers with code

Sentinel: An Aggregation Function to Secure Decentralized Federated Learning

no code implementations12 Oct 2023 Chao Feng, Alberto Huertas Celdran, Janosch Baltensperger, Enrique Tomas Martinez Beltran, Gerome Bovet, Burkhard Stiller

The rapid integration of Federated Learning (FL) into networking encompasses various aspects such as network management, quality of service, and cybersecurity while preserving data privacy.

Federated Learning Management

CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation

no code implementations11 Aug 2023 Chao Feng, Alberto Huertas Celdran, Pedro Miguel Sanchez Sanchez, Jan Kreischer, Jan von der Assen, Gerome Bovet, Gregorio Martinez Perez, Burkhard Stiller

Recent research has shown that the integration of Reinforcement Learning (RL) with Moving Target Defense (MTD) can enhance cybersecurity in Internet-of-Things (IoT) devices.

Anomaly Detection Data Poisoning +3

RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports

1 code implementation20 Jul 2023 Muriel Figueredo Franco, Fabian Künzler, Jan von der Assen, Chao Feng, Burkhard Stiller

Therefore, managing risk exposure and cybersecurity strategies is essential for digitized companies that want to survive in competitive markets.

Management

RansomAI: AI-powered Ransomware for Stealthy Encryption

no code implementations27 Jun 2023 Jan von der Assen, Alberto Huertas Celdrán, Janik Luechinger, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

Cybersecurity solutions have shown promising performance when detecting ransomware samples that use fixed algorithms and encryption rates.

Q-Learning

FederatedTrust: A Solution for Trustworthy Federated Learning

no code implementations20 Feb 2023 Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Ning Xie, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

Subsequently, an algorithm named FederatedTrust is designed based on the pillars and metrics identified in the taxonomy to compute the trustworthiness score of FL models.

Edge-computing Fairness +2

RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT

1 code implementation30 Dec 2022 Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jan von der Assen, Timo Schenk, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

Reinforcement Learning (RL) could be an effective approach to optimize the MTD selection through trial and error, but the literature fails when i) evaluating the performance of RL and MTD solutions in real-world scenarios, ii) studying whether behavioral fingerprinting is suitable for representing SBC's states, and iii) calculating the consumption of resources in SBC.

Reinforcement Learning (RL)

Cannot find the paper you are looking for? You can Submit a new open access paper.