Zobrazeno 1 - 10
of 20
pro vyhledávání: '"David Noever"'
Autor:
Forrest McKee, David Noever
Publikováno v:
International Journal on Cryptography and Information Security. 13:1-34
This study explores cybersecurity questions using a question-and-answer format with the advanced ChatGPT model from OpenAI. Unlike previous chatbots, ChatGPT demonstrates an enhanced understanding of complex coding questions. We present thirteen codi
Autor:
Forrest McKee, David Noever
The practical implications of issuing inaudible voice commands. The research mapped each attack vector to a tactic or technique from the MITRE ATT&CK matrix, covering enterprise, mobile, and Industrial Control System (ICS) frameworks. The experiment
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::45b57e0cf251440b9ea77426336ea299
Autor:
David Noever, Matt Ciolino
This research revisits the classic Turing test and compares recent large language models such as ChatGPT for their abilities to reproduce human-level comprehension and compelling text generation. Two task challenges -- summarization, and question ans
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b39fdb979d1ac7f8033ed4c37a2575b5
http://arxiv.org/abs/2212.06721
http://arxiv.org/abs/2212.06721
Publikováno v:
International Journal of Network Security & Its Applications. 13:1-13
This research recasts the network attack dataset from UNSW-NB15 as an intrusion detection problem in image space. Using one-hot-encodings, the resulting grayscale thumbnails provide a quarter-million examples for deep learning algorithms. Applying th
Autor:
Forrest McKee, David Noever
Question-and-answer formats provide a novel experimental platform for investigating cybersecurity questions. Unlike previous chatbots, the latest ChatGPT model from OpenAI supports an advanced understanding of complex coding questions. The research d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::255611e3c2422850076dc7cf88b38b65
Publikováno v:
Advances in Machine Learning.
A malicious firmware update may prove devastating to the embedded devices both that make up the Internet of Things (IoT) and alsothat typically lack the same security verifications now applied to full operating systems. This work converts the binary
Autor:
David Noever, Ryerson Burdick
The application of Generative Pre-trained Transformer (GPT-2) to learn text-archived game notation provides a model environment for exploring sparse reward gameplay. The transformer architecture proves amenable to training on solved text archives des
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::782528472b5ecbb71b38b2ff98cbbb4d
http://arxiv.org/abs/2109.02797
http://arxiv.org/abs/2109.02797
Publikováno v:
AIAA AVIATION 2021 FORUM.
Publikováno v:
Computer Science & Information Technology (CS & IT).
Machine learning models present a risk of adversarial attack when deployed in production. Quantifying the contributing factors and uncertainties using empirical measures could assist the industry with assessing the risk of downloading and deploying c
Publikováno v:
Computer Science & Information Technology (CS & IT).
This research recasts the network attack dataset from UNSW-NB15 as an intrusion detection problem in image space. Using one-hot-encodings, the resulting grayscale thumbnails provide a quarter-million examples for deep learning algorithms. Applying th