Zobrazeno 1 - 10
of 810
pro vyhledávání: '"HASTINGS, JOHN"'
This research explores the application of large language models (LLMs) to generate synthetic datasets for Product Desirability Toolkit (PDT) testing, a key component in evaluating user sentiment and product experience. Utilizing gpt-4o-mini, a cost-e
Externí odkaz:
http://arxiv.org/abs/2411.13485
Autor:
Arora, Sunil, Hastings, John
This paper presents a multi-cloud networking architecture built on zero trust principles and micro-segmentation to provide secure connectivity with authentication, authorization, and encryption in transit. The proposed design includes the multi-cloud
Externí odkaz:
http://arxiv.org/abs/2411.12162
Ransomware and other forms of malware cause significant financial and operational damage to organizations by exploiting long-standing and often difficult-to-detect software vulnerabilities. To detect vulnerabilities such as buffer overflows in compil
Externí odkaz:
http://arxiv.org/abs/2409.17513
Autor:
Arora, Sunil, Hastings, John D.
This study investigates the prevalence and underlying causes of work-related stress and burnout among cybersecurity professionals using a quantitative survey approach guided by the Job Demands-Resources model. Analysis of responses from 50 cybersecur
Externí odkaz:
http://arxiv.org/abs/2409.12047
This study investigates the meta-issues surrounding social media, which, while theoretically designed to enhance social interactions and improve our social lives by facilitating the sharing of personal experiences and life events, often results in ad
Externí odkaz:
http://arxiv.org/abs/2408.10351
This study explores the use of LLMs for providing quantitative zero-shot sentiment analysis of implicit software desirability, addressing a critical challenge in product evaluation where traditional review scores, though convenient, fail to capture t
Externí odkaz:
http://arxiv.org/abs/2408.01527
This listing contains a total of 80 gamification applications (GA)s used in cyber security operations (CSO) undergraduate education, from 74 publications, published between 2007 and June 2022. The listing outlines each GA identified and provides a sh
Externí odkaz:
http://arxiv.org/abs/2406.17882
As emerging software vulnerabilities continuously threaten enterprises and Internet services, there is a critical need for improved security research capabilities. This paper introduces the Security Exploit Telemetry Collection (SETC) framework - an
Externí odkaz:
http://arxiv.org/abs/2406.05942
Autor:
Wollman, Alex, Hastings, John
Unikernels, an evolution of LibOSs, are emerging as a virtualization technology to rival those currently used by cloud providers. Unikernels combine the user and kernel space into one "uni"fied memory space and omit functionality that is not necessar
Externí odkaz:
http://arxiv.org/abs/2406.01872
Detecting vulnerabilities within compiled binaries is challenging due to lost high-level code structures and other factors such as architectural dependencies, compilers, and optimization options. To address these obstacles, this research explores vul
Externí odkaz:
http://arxiv.org/abs/2405.20611