A Survey of Poisoning Attacks and Defenses in Recommender Systems
-
Updated
Oct 26, 2024
A Survey of Poisoning Attacks and Defenses in Recommender Systems
XDIVINSA: eXtended DIVersifying INStruction Agent to mitigate power side-channel leakage
Cyber Attacks Mitigation
Buffer overflow is a critical security vulnerability that occurs when a program writes more data into a buffer than it can handle, leading to memory corruption. Attackers can exploit this flaw to execute arbitrary code, modify program behavior, or escalate privileges, making it a severe risk in server
Project for the 'Network Security' exam, focusing on the implementation of a VANET. This project also involves the implementation of potential attacks and their corresponding countermeasures within this network.
Cross-Site Request Forgery (CSRF) is a web security vulnerability that explores CSRF attack techniques, vulnerability analysis, and mitigation strategies. It includes hands-on demonstrations of how CSRF attacks work, how to identify weak implementations, and how to secure web applications against such threats.
Add a description, image, and links to the countermeasures topic page so that developers can more easily learn about it.
To associate your repository with the countermeasures topic, visit your repo's landing page and select "manage topics."