Zobrazeno 1 - 10
of 115
pro vyhledávání: '"Piplai A"'
Large Language Models have become a valuable source of information for our daily inquiries. However, after training, its data source quickly becomes out-of-date, making RAG a useful tool for providing even more recent or pertinent data. In this work,
Externí odkaz:
http://arxiv.org/abs/2411.04341
Data protection and privacy is becoming increasingly crucial in the digital era. Numerous companies depend on third-party vendors and service providers to carry out critical functions within their operations, encompassing tasks such as data handling
Externí odkaz:
http://arxiv.org/abs/2404.19744
The ever-evolving ways attacker continues to im prove their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of
Externí odkaz:
http://arxiv.org/abs/2402.17249
In this research, we analyzed the suitability of each of the current state-of-the-art machine learning models for various cyberattack detection from the past 5 years with a major emphasis on the most recent works for comparative study to identify the
Externí odkaz:
http://arxiv.org/abs/2402.17045
In an increasingly interconnected world, where information is the lifeblood of modern society, regular cyber-attacks sabotage the confidentiality, integrity, and availability of digital systems and information. Additionally, cyber-attacks differ depe
Externí odkaz:
http://arxiv.org/abs/2401.05680
Autor:
Piplai, Aritran, Kotal, Anantaa, Mohseni, Seyedreza, Gaur, Manas, Mittal, Sudip, Joshi, Anupam
Neuro-Symbolic Artificial Intelligence (AI) is an emerging and quickly advancing field that combines the subsymbolic strengths of (deep) neural networks and explicit, symbolic knowledge contained in knowledge graphs to enhance explainability and safe
Externí odkaz:
http://arxiv.org/abs/2308.02031
Cyber-defense systems are being developed to automatically ingest Cyber Threat Intelligence (CTI) that contains semi-structured data and/or text to populate knowledge graphs. A potential risk is that fake CTI can be generated and spread through Open-
Externí odkaz:
http://arxiv.org/abs/2102.04351
Autor:
Boukouvalas, Zois, Mallinson, Christine, Crothers, Evan, Japkowicz, Nathalie, Piplai, Aritran, Mittal, Sudip, Joshi, Anupam, Adalı, Tülay
Social media has become an important communication channel during high impact events, such as the COVID-19 pandemic. As misinformation in social media can rapidly spread, creating social unrest, curtailing the spread of misinformation during such eve
Externí odkaz:
http://arxiv.org/abs/2006.01284
With the recent developments in artificial intelligence and machine learning, anomalies in network traffic can be detected using machine learning approaches. Before the rise of machine learning, network anomalies which could imply an attack, were det
Externí odkaz:
http://arxiv.org/abs/2002.08527
Security Analysts that work in a `Security Operations Center' (SoC) play a major role in ensuring the security of the organization. The amount of background knowledge they have about the evolving and new attacks makes a significant difference in thei
Externí odkaz:
http://arxiv.org/abs/1905.02497