Zobrazeno 1 - 10
of 568
pro vyhledávání: '"Kumar Ayush"'
Autor:
Kumar, Ayush, Thing, Vrizlynn L. L.
Internet-of-Things (IoT) Network Intrusion Detection Systems (NIDSs) which use machine learning (ML) models achieve high detection performance and accuracy while avoiding dependence on fixed signatures extracted from attack artifacts. However, there
Externí odkaz:
http://arxiv.org/abs/2408.14040
Autor:
Budagam, Devichand, Kumar, Ayush, Ghosh, Sayan, Shrivastav, Anuj, Imanbayev, Azamat Zhanatuly, Akhmetov, Iskander Rafailovich, Kaplun, Dmitrii, Antonov, Sergey, Rychenkov, Artem, Cyganov, Gleb, Sinitca, Aleksandr
Teeth segmentation and recognition are critical in various dental applications and dental diagnosis. Automatic and accurate segmentation approaches have been made possible by integrating deep learning models. Although teeth segmentation has been stud
Externí odkaz:
http://arxiv.org/abs/2406.03747
In safety-critical systems that interface with the real world, the role of uncertainty in decision-making is pivotal, particularly in the context of machine learning models. For the secure functioning of Cyber-Physical Systems (CPS), it is imperative
Externí odkaz:
http://arxiv.org/abs/2404.16893
Fine-tuning large language models (LLMs) with domain-specific instructions has emerged as an effective method to enhance their domain-specific understanding. Yet, there is limited work that examines the core characteristics acquired during this proce
Externí odkaz:
http://arxiv.org/abs/2312.15922
Autor:
Kumar, Ayush, Thing, Vrizlynn L. L.
5G networks are susceptible to cyber attacks due to reasons such as implementation issues and vulnerabilities in 3GPP standard specifications. In this work, we propose lateral movement strategies in a 5G Core (5GC) with network slicing enabled, as pa
Externí odkaz:
http://arxiv.org/abs/2312.01681
Autor:
Kumar, Ayush, Thing, Vrizlynn L. L.
The 3GPP 5G Service-based Architecture (SBA) security specifications leave several details on how to setup an appropriate Public Key Infrastructure (PKI) for 5G SBA, unspecified. In this work, we propose 5G-SBA-PKI, a public key infrastructure for se
Externí odkaz:
http://arxiv.org/abs/2309.14659
Autor:
Kumar, Ayush, Yau, David K.
In this work, we propose a testbed environment to capture the attack strategies of an adversary carrying out a cyber-attack on an enterprise network. The testbed contains nodes with known security vulnerabilities which can be exploited by hackers. Pa
Externí odkaz:
http://arxiv.org/abs/2307.02794
LLM-powered chatbots are becoming widely adopted in applications such as healthcare, personal assistants, industry hiring decisions, etc. In many of these cases, chatbots are fed sensitive, personal information in their prompts, as samples for in-con
Externí odkaz:
http://arxiv.org/abs/2305.15008
The latest WHO report showed that the number of malaria cases climbed to 219 million last year, two million higher than last year. The global efforts to fight malaria have hit a plateau and the most significant underlying reason is international fund
Externí odkaz:
http://arxiv.org/abs/2303.03397
Autor:
Kumar, Ayush, Thing, Vrizlynn L. L.
Past Advanced Persistent Threat (APT) attacks on Industrial Internet-of-Things (IIoT), such as the 2016 Ukrainian power grid attack and the 2017 Saudi petrochemical plant attack, have shown the disruptive effects of APT campaigns while new IIoT malwa
Externí odkaz:
http://arxiv.org/abs/2301.11524