Zobrazeno 1 - 10
of 56
pro vyhledávání: '"Catania, Carlos"'
Large Language Models (LLMs) have shown remarkable potential across various domains, including cybersecurity. Using commercial cloud-based LLMs may be undesirable due to privacy concerns, costs, and network connectivity constraints. In this paper, we
Externí odkaz:
http://arxiv.org/abs/2409.11276
Understanding cybercrime communications is paramount for cybersecurity defence. This often involves translating communications into English for processing, interpreting, and generating timely intelligence. The problem is that translation is hard. Hum
Externí odkaz:
http://arxiv.org/abs/2404.01940
Honeypots are essential tools in cybersecurity for early detection, threat intelligence gathering, and analysis of attacker's behavior. However, most of them lack the required realism to engage and fool human attackers long-term. Being easy to distin
Externí odkaz:
http://arxiv.org/abs/2309.00155
Large Language Models (LLMs) have gained widespread popularity across diverse domains involving text generation, summarization, and various natural language processing tasks. Despite their inherent limitations, LLM-based designs have shown promising
Externí odkaz:
http://arxiv.org/abs/2308.12086
Even though a train/test split of the dataset randomly performed is a common practice, could not always be the best approach for estimating performance generalization under some scenarios. The fact is that the usual machine learning methodology can s
Externí odkaz:
http://arxiv.org/abs/2209.03346
In contrast to previous surveys, the present work is not focused on reviewing the datasets used in the network security field. The fact is that many of the available public labeled datasets represent the network behavior just for a particular time pe
Externí odkaz:
http://arxiv.org/abs/2110.05977
Autor:
Lama, Sebastián Paez, Catania, Carlos, Ribeiro, Luana P., Ryszard Puchala, Gipson, Terry A., Goetsch, Arthur L.
Publikováno v:
In Small Ruminant Research April 2024 233
Domain Name Service is a trusted protocol made for name resolution, but during past years some approaches have been developed to use it for data transfer. DNS Tunneling is a method where data is encoded inside DNS queries, allowing information exchan
Externí odkaz:
http://arxiv.org/abs/2006.06122
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
In Computers & Security September 2022 120