Zobrazeno 1 - 10
of 563
pro vyhledávání: '"Bridges, Robert A"'
Vehicular controller area networks (CANs) are susceptible to masquerade attacks by malicious adversaries. In masquerade attacks, adversaries silence a targeted ID and then send malicious frames with forged content at the expected timing of benign fra
Externí odkaz:
http://arxiv.org/abs/2406.13778
The Exponential Mechanism (ExpM), designed for private optimization, has been historically sidelined from use on continuous sample spaces, as it requires sampling from a generally intractable density, and, to a lesser extent, bounding the sensitivity
Externí odkaz:
http://arxiv.org/abs/2311.09200
Autor:
Bridges, Robert A., Weber, Brian, Beaver, Justin M., Smith, Jared M., Verma, Miki E., Norem, Savannah, Spakes, Kevin, Watson, Cory, Nichols, Jeff A., Jewell, Brian, Iannacone, Michael. D., Stahl, Chelsey Dunivan, Huffer, Kelly M. T., Oesch, T. Sean
This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intell
Externí odkaz:
http://arxiv.org/abs/2308.14835
Autor:
Bridges, Robert A., Rice, Ashley E., Oesch, Sean, Nichols, Jeff A., Watson, Cory, Spakes, Kevin, Norem, Savannah, Huettel, Mike, Jewell, Brian, Weber, Brian, Gannon, Connor, Bizovi, Olivia, Hollifield, Samuel C, Erwin, Samantha
Publikováno v:
Computers & Security 2023
Modern security operation centers (SOCs) rely on operators and a tapestry of logging and alerting tools with large scale collection and query abilities. SOC investigations are tedious as they rely on manual efforts to query diverse data sources, over
Externí odkaz:
http://arxiv.org/abs/2208.06075
In this case study, we describe the design and assembly of a cyber security testbed at Oak Ridge National Laboratory in Oak Ridge, TN, USA. The range is designed to provide agile reconfigurations to facilitate a wide variety of experiments for evalua
Externí odkaz:
http://arxiv.org/abs/2201.08473
Publikováno v:
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2022
Vehicular Controller Area Networks (CANs) are susceptible to cyber attacks of different levels of sophistication. Fabrication attacks are the easiest to administer -- an adversary simply sends (extra) frames on a CAN -- but also the easiest to detect
Externí odkaz:
http://arxiv.org/abs/2201.02665
Autor:
Norem, Savannah, Rice, Ashley E, Erwin, Samantha, Bridges, Robert A, Oesch, Sean, Weber, Brian
Security operation centers (SOCs) all over the world are tasked with reacting to cybersecurity alerts ranging in severity. Security Orchestration, Automation, and Response (SOAR) tools streamline cybersecurity alert responses by SOC operators. SOAR t
Externí odkaz:
http://arxiv.org/abs/2112.00100
Autor:
Bihler, Hermann, Sivachenko, Andrey, Millen, Linda, Bhatt, Priyanka, Patel, Amita Thakerar, Chin, Justin, Bailey, Violaine, Musisi, Isaac, LaPan, André, Allaire, Normand E., Conte, Joshua, Simon, Noah R., Magaret, Amalia S., Raraigh, Karen S., Cutting, Garry R., Skach, William R., Bridges, Robert J., Thomas, Philip J., Mense, Martin
Publikováno v:
In Journal of Cystic Fibrosis July 2024 23(4):664-675
Policy-mandated, rigorously administered scientific testing is needed to provide transparency into the efficacy of artificial intelligence-based (AI-based) cyber defense tools for consumers and to prioritize future research and development. In this a
Externí odkaz:
http://arxiv.org/abs/2105.06545
Autor:
Blevins, Deborah H., Moriano, Pablo, Bridges, Robert A., Verma, Miki E., Iannacone, Michael D., Hollifield, Samuel C
Publikováno v:
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021
Modern vehicles are complex cyber-physical systems made of hundreds of electronic control units (ECUs) that communicate over controller area networks (CANs). This inherited complexity has expanded the CAN attack surface which is vulnerable to message
Externí odkaz:
http://arxiv.org/abs/2101.05781