Zobrazeno 1 - 10
of 163
pro vyhledávání: '"Jewell, Brian"'
Autor:
Bridges, Robert A., Weber, Brian, Beaver, Justin M., Smith, Jared M., Verma, Miki E., Norem, Savannah, Spakes, Kevin, Watson, Cory, Nichols, Jeff A., Jewell, Brian, Iannacone, Michael. D., Stahl, Chelsey Dunivan, Huffer, Kelly M. T., Oesch, T. Sean
This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intell
Externí odkaz:
http://arxiv.org/abs/2308.14835
Autor:
Bridges, Robert A., Rice, Ashley E., Oesch, Sean, Nichols, Jeff A., Watson, Cory, Spakes, Kevin, Norem, Savannah, Huettel, Mike, Jewell, Brian, Weber, Brian, Gannon, Connor, Bizovi, Olivia, Hollifield, Samuel C, Erwin, Samantha
Publikováno v:
Computers & Security 2023
Modern security operation centers (SOCs) rely on operators and a tapestry of logging and alerting tools with large scale collection and query abilities. SOC investigations are tedious as they rely on manual efforts to query diverse data sources, over
Externí odkaz:
http://arxiv.org/abs/2208.06075
Autor:
Bridges, Robert A., Oesch, Sean, Verma, Miki E., Iannacone, Michael D., Huffer, Kelly M. T., Jewell, Brian, Nichols, Jeff A., Weber, Brian, Beaver, Justin M., Smith, Jared M., Scofield, Daniel, Miles, Craig, Plummer, Thomas, Daniell, Mark, Tall, Anne M.
Publikováno v:
Digital Threats: Research and Practice 2023
In this paper, we present a scientific evaluation of four prominent malware detection tools to assist an organization with two primary questions: To what extent do ML-based tools accurately classify previously- and never-before-seen files? Is it wort
Externí odkaz:
http://arxiv.org/abs/2012.09214
Autor:
Bridges, Robert A., Rice, Ashley E., Oesch, Sean, Nichols, Jeffrey. A., Watson, Cory, Spakes, Kevin, Norem, Savannah, Huettel, Mike, Jewell, Brian, Weber, Brian, Gannon, Connor, Bizovi, Olivia, Hollifield, Samuel C., Erwin, Samantha
Publikováno v:
In Computers & Security June 2023 129
Autor:
CRAMP, JASON
Publikováno v:
Pool & Spa Marketing. 2015, Vol. 39 Issue 5, p34-36. 3p.
Autor:
Bridges, Robert A., Oesch, Sean, Iannacone, Michael D., Huffer, Kelly M. T., Jewell, Brian, Nichols, Jeff A., Weber, Brian, Verma, Miki E., Scofield, Daniel, Miles, Craig, Plummer, Thomas, Daniell, Mark, Tall, Anne M., Beaver, Justin M., Smith, Jared M.
Publikováno v:
Digital Threats: Research & Practice; Jun2023, Vol. 4 Issue 2, p1-22, 22p
Autor:
JEWELL, BRIAN1 brian@highburypools.com
Publikováno v:
Pool & Spa Marketing. Apr2015, Vol. 39 Issue 3, p24-28. 5p.
Autor:
Steed, Chad A., Evans, Katherine J., Harney, John F., Jewell, Brian C., Shipman, Galen, Smith, Brian E., Thornton, Peter E., Williams, Dean N.
Publikováno v:
2014 IEEE International Conference on Big Data (Big Data); 2014, p383-392, 10p
Autor:
Jewell, Brian, Beaver, Justin
Publikováno v:
Proceedings of the International Conference on Information Warfare & Security; 2011, p134-142, 9p, 1 Chart, 3 Graphs
Publikováno v:
Techniques in Orthopaedics; Summer1993, Vol. 8 Issue 2, p120-128, 9p