Zobrazeno 1 - 10
of 16 550
pro vyhledávání: '"P, Hastings"'
Insider threats (InTs) within organizations are small in number but have a disproportionate ability to damage systems, information, and infrastructure. Existing InT research studies the problem from psychological, technical, and educational perspecti
Externí odkaz:
http://arxiv.org/abs/2412.13446
The rapid growth of remote healthcare delivery has introduced significant security and privacy risks to protected health information (PHI). Analysis of a comprehensive healthcare security breach dataset covering 2009-2023 reveals their significant pr
Externí odkaz:
http://arxiv.org/abs/2412.13440
CEKER: A Generalizable LLM Framework for Literature Analysis with a Case Study in Unikernel Security
Autor:
Wollman, Alex, Hastings, John
Literature reviews are a critical component of formulating and justifying new research, but are a manual and often time-consuming process. This research introduces a novel, generalizable approach to literature analysis called CEKER which uses a three
Externí odkaz:
http://arxiv.org/abs/2412.10904
Autor:
Ti, Changpeng, Hassan, Usman, Vatsavai, Sairam Sri, McCarter, Margaret, Vasdev, Aastha, An, Jincheng, Achinuq, Barat, Welp, Ulrich, Cheung, Sen-Ching, Thakkar, Ishan G, Hastings, J. Todd
Patterned nanomagnet arrays (PNAs) have been shown to exhibit a strong geometrically frustrated dipole interaction. Some PNAs have also shown emergent domain wall dynamics. Previous works have demonstrated methods to physically probe these magnetizat
Externí odkaz:
http://arxiv.org/abs/2412.04622
Autor:
Hastings, M. B.
The sum-of-squares method can give rigorous lower bounds on the energy of quantum Hamiltonians. Unfortunately, typically using this method requires solving a semidefinite program, which can be computationally expensive. Further, the typically used de
Externí odkaz:
http://arxiv.org/abs/2412.03564
This study examines the impact of data snooping on neural networks for vulnerability detection in lifted code, building on previous research which used word2vec, and unidirectional and bidirectional transformer-based embeddings. The research specific
Externí odkaz:
http://arxiv.org/abs/2412.02048
This research explores the application of large language models (LLMs) to generate synthetic datasets for Product Desirability Toolkit (PDT) testing, a key component in evaluating user sentiment and product experience. Utilizing gpt-4o-mini, a cost-e
Externí odkaz:
http://arxiv.org/abs/2411.13485
Autor:
Reichardt, Ben W., Paetznick, Adam, Aasen, David, Basov, Ivan, Bello-Rivas, Juan M., Bonderson, Parsa, Chao, Rui, van Dam, Wim, Hastings, Matthew B., Paz, Andres, da Silva, Marcus P., Sundaram, Aarthi, Svore, Krysta M., Vaschillo, Alexander, Wang, Zhenghan, Zanner, Matt, Cairncross, William B., Chen, Cheng-An, Crow, Daniel, Kim, Hyosub, Kindem, Jonathan M., King, Jonathan, McDonald, Michael, Norcia, Matthew A., Ryou, Albert, Stone, Mark, Wadleigh, Laura, Barnes, Katrina, Battaglino, Peter, Bohdanowicz, Thomas C., Booth, Graham, Brown, Andrew, Brown, Mark O., Cassella, Kayleigh, Coxe, Robin, Epstein, Jeffrey M., Feldkamp, Max, Griger, Christopher, Halperin, Eli, Heinz, Andre, Hummel, Frederic, Jaffe, Matthew, Jones, Antonia M. W., Kapit, Eliot, Kotru, Krish, Lauigan, Joseph, Li, Ming, Marjanovic, Jan, Megidish, Eli, Meredith, Matthew, Morshead, Ryan, Muniz, Juan A., Narayanaswami, Sandeep, Nishiguchi, Ciro, Paule, Timothy, Pawlak, Kelly A., Pudenz, Kristen L., Pérez, David Rodríguez, Simon, Jon, Smull, Aaron, Stack, Daniel, Urbanek, Miroslav, van de Veerdonk, René J. M., Vendeiro, Zachary, Weverka, Robert T., Wilkason, Thomas, Wu, Tsung-Yao, Xie, Xin, Zalys-Geller, Evan, Zhang, Xiaogang, Bloom, Benjamin J.
Transitioning from quantum computation on physical qubits to quantum computation on encoded, logical qubits can improve the error rate of operations, and will be essential for realizing valuable quantum computational advantages. Using a neutral atom
Externí odkaz:
http://arxiv.org/abs/2411.11822
Autor:
Arora, Sunil, Hastings, John
This paper presents a multi-cloud networking architecture built on zero trust principles and micro-segmentation to provide secure connectivity with authentication, authorization, and encryption in transit. The proposed design includes the multi-cloud
Externí odkaz:
http://arxiv.org/abs/2411.12162
Autor:
Serpico, Jacob, Zambrano-Luna, B. A., Milne, Russell, Heggerud, Christopher M., Hastings, Alan, Wang, Hao
Harmful cyanobacterial blooms (CBs) have a growing global prevalence, emerging as a significant environmental concern due to their potential toxicity. Understanding how the different mechanisms affect CBs is crucial to develop actionable management s
Externí odkaz:
http://arxiv.org/abs/2410.20757