Zobrazeno 1 - 10
of 37
pro vyhledávání: '"Andrew Walenstein"'
Autor:
Jinxin Liu, Burak Kantarci, Andrew Malton, Murat Simsek, Andrew Walenstein, Melike Erol-Kantarci
Publikováno v:
Digital Threats: Research and Practice. 3:1-29
Access to resources by users may need to be granted only upon certain conditions and contexts, perhaps particularly in cyber-physical settings. Unfortunately, creating and modifying context-sensitive access control solutions in dynamic environments c
Autor:
Christopher Molloy, Jeremy Banks, H. H. Steven Ding, Philippe Charland, Andrew Walenstein, Litao Li
Publikováno v:
2022 IEEE International Conference on Data Mining (ICDM).
Autor:
Kundi Yao, Gustavo A. Oliva, Ahmed E. Hassan, Muhammad Asaduzzaman, Andrew J. Malton, Andrew Walenstein
Publikováno v:
Journal of Systems and Software. 201:111651
Publikováno v:
ACM Transactions on Internet of Things. 2:1-20
Embedded sensors and smart devices have turned the environments around us into smart spaces that could automatically evolve, depending on the needs of users, and adapt to the new conditions. While smart spaces are beneficial and desired in many aspec
Publikováno v:
CCNC
Social networking research has primarily focused on public social networking services and applications, while rich social interactions in an enterprise setting and their related context has received less attention. In this paper, we focus on using th
Autor:
Andrew Walenstein, Andrew Malton
Publikováno v:
CESSER-IP@ICSE
We present an approach to industry-academic research collaboration in which generative modeling is the central mechanism for not only enabling tactical coordination in exploratory research, but also for ensuring strategic alignment of both partners t
Publikováno v:
Intelligent Vehicles Symposium
Anomaly detection techniques have been applied to the challenging problem of ensuring both cybersecurity and safety of connected vehicles. We propose a taxonomy of prior research in this domain. Our proposed taxonomy has 3 overarching dimensions subs
Publikováno v:
SOSE
The Internet of Things (IoT) has connected an incredible diversity of devices in novel ways, which has enabled exciting new services and opportunities. Unfortunately, IoT systems also present several important challenges to developers. This paper pro
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 9:137-157
One method malware authors use to defeat detection of their programs is to use morphing engines to rapidly generate a large number of variants. Inspired by previous works in author attribution of natural language text, we investigate a problem of att
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 9:109-123
VILO is a lazy learner system designed for malware classification and triage. It implements a nearest neighbor (NN) algorithm with similarities computed over Term Frequency $$\times $$ Inverse Document Frequency (TFIDF) weighted opcode mnemonic permu