Zobrazeno 1 - 10
of 1 546
pro vyhledávání: '"P, Clouston"'
Autor:
Clairoux-Trepanier, Vanessa, Beauchamp, Isa-May, Ruellan, Estelle, Paquet-Clouston, Masarah, Paquette, Serge-Olivier, Clay, Eric
Large language models (LLMs) can be used to analyze cyber threat intelligence (CTI) data from cybercrime forums, which contain extensive information and key discussions about emerging cyber threats. However, to date, the level of accuracy and efficie
Externí odkaz:
http://arxiv.org/abs/2408.03354
The intuitionistic modal logics considered between Constructive K (CK) and Intuitionistic K (IK) differ in their treatment of the possibility (diamond) connective. It was recently rediscovered that some logics between CK and IK also disagree on their
Externí odkaz:
http://arxiv.org/abs/2408.00262
Autor:
Barbero, Janos, Franceschi, Ana, Giliberto, Luca, Do, Patrick Phuoc, Petrover, David, Truong, Jack Nhat, Clouston, Sean, Nguyen, Nha, Gordon, Marc, Vo, An
[18F]-florbetaben positron emission tomography (PET) imaging is an established marker of {\ss}-Amyloid (A{\ss}) that is being increasingly used to assess A{\ss} deposition in AD. This study presents a novel, explainable machine learning-based biomark
Externí odkaz:
http://arxiv.org/abs/2401.04110
Autor:
Carpentier-Desjardins, Catherine, Paquet-Clouston, Masarah, Kitzler, Stefan, Haslhofer, Bernhard
Decentralized finance (DeFi) has been the target of numerous profit-driven crimes, but the prevalence and cumulative impact of these crimes have not yet been assessed. This study provides a comprehensive assessment of profit-driven crimes targeting t
Externí odkaz:
http://arxiv.org/abs/2310.04356
Ransomware-as-a-service (RaaS) is increasing the scale and complexity of ransomware attacks. Understanding the internal operations behind RaaS has been a challenge due to the illegality of such activities. The recent chat leak of the Conti RaaS opera
Externí odkaz:
http://arxiv.org/abs/2308.16061
Publikováno v:
Crime Science, Vol 13, Iss 1, Pp 1-13 (2024)
Abstract Ransomware-as-a-service (RaaS) is increasing the scale and complexity of ransomware attacks. Understanding the internal operations behind RaaS has been a challenge due to the illegality of such activities. The recent chat leak of the Conti R
Externí odkaz:
https://doaj.org/article/1893e0ee0a354e41a9fb277128bde47c
Autor:
Mangalik, Siddharth, Eichstaedt, Johannes C., Giorgi, Salvatore, Mun, Jihu, Ahmed, Farhan, Gill, Gilvir, Ganesan, Adithya V., Subrahmanya, Shashanka, Soni, Nikita, Clouston, Sean A. P., Schwartz, H. Andrew
Compared to physical health, population mental health measurement in the U.S. is very coarse-grained. Currently, in the largest population surveys, such as those carried out by the Centers for Disease Control or Gallup, mental health is only broadly
Externí odkaz:
http://arxiv.org/abs/2302.12952
Autor:
Siddharth Mangalik, Johannes C. Eichstaedt, Salvatore Giorgi, Jihu Mun, Farhan Ahmed, Gilvir Gill, Adithya V. Ganesan, Shashanka Subrahmanya, Nikita Soni, Sean A. P. Clouston, H. Andrew Schwartz
Publikováno v:
npj Digital Medicine, Vol 7, Iss 1, Pp 1-12 (2024)
Abstract In the most comprehensive population surveys, mental health is only broadly captured through questionnaires asking about “mentally unhealthy days” or feelings of “sadness.” Further, population mental health estimates are predominantl
Externí odkaz:
https://doaj.org/article/3330a9b035644e88808b983c382a42af
Publikováno v:
Journal of Cybersecurity 8-1 (2022) 1-14
Many activities related to cybercrime operations do not require much secrecy, such as developing websites or translating texts. This research provides indications that many users of a popular public internet marketing forum have connections to cyberc
Externí odkaz:
http://arxiv.org/abs/2202.01644
Autor:
Teagan Fink, Siddhartha Deb, David Clouston, Michael Weymouth, Chantel Thornton, Anannya Chakrabarti
Publikováno v:
Australasian Journal of Plastic Surgery, Vol 7, Iss 1 (2024)
Externí odkaz:
https://doaj.org/article/59869660cc294ed5ad37640b8f1b17d3