Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Pittman, Jason M."'
Autor:
Pittman, Jason M.
Contemporary artificial intelligence systems are pivotal in enhancing human efficiency and safety across various domains. One such domain is autonomous systems, especially in automotive and defense use cases. Artificial intelligence brings learning a
Externí odkaz:
http://arxiv.org/abs/2407.14975
Autor:
Pittman, Jason M., Alaee, Shaho
Cyber threats, such as advanced persistent threats (APTs), ransomware, and zero-day exploits, are rapidly evolving and demand improved security measures. Honeypots and honeynets, as deceptive systems, offer valuable insights into attacker behavior, h
Externí odkaz:
http://arxiv.org/abs/2307.11038
Autor:
Pittman, Jason M.
Port scanning refers to the systematic exploration of networked computing systems. The goal of port scanning is to identify active services and associated information. Although this technique is often employed by malicious actors to locate vulnerable
Externí odkaz:
http://arxiv.org/abs/2303.11282
Autor:
Pittman, Jason M.
Port scanning is the process of attempting to connect to various network ports on a computing endpoint to determine which ports are open and which services are running on them. It is a common method used by hackers to identify vulnerabilities in a ne
Externí odkaz:
http://arxiv.org/abs/2302.09317
Autor:
Pittman, Jason M.
Port scanning is the process of attempting to connect to various network ports on a computing endpoint to determine which ports are open and which services are running on them. It is a common method used by hackers to identify vulnerabilities in a ne
Externí odkaz:
http://arxiv.org/abs/2301.13581
Autor:
Pittman, Jason M., Hanks, Ashlyn
Human-like intelligence in a machine is a contentious subject. Whether mankind should or should not pursue the creation of artificial general intelligence is hotly debated. As well, researchers have aligned in opposing factions according to whether m
Externí odkaz:
http://arxiv.org/abs/2011.05807
Honeypots are a deceptive technology used to capture malicious activity. The technology is useful for studying attacker behavior, tools, and techniques but can be difficult to implement and maintain. Historically, a lack of measures of effectiveness
Externí odkaz:
http://arxiv.org/abs/2011.00582
Honeypots are computing systems used to capture unauthorized, often malicious, activity. While honeypots can take on a variety of forms, researchers agree the technology is useful for studying adversary behavior, tools, and techniques. Unfortunately,
Externí odkaz:
http://arxiv.org/abs/2005.12969
Autor:
Pittman, Jason M., Robinson, Nikki
The purpose of this study was to measure whether participant education, profession, and technical skill level exhibited a relationship with identification of password strength. Participants reviewed 50 passwords and labeled each as weak or strong. A
Externí odkaz:
http://arxiv.org/abs/2001.04930
Awareness of the possible impacts associated with artificial intelligence has risen in proportion to progress in the field. While there are tremendous benefits to society, many argue that there are just as many, if not more, concerns related to advan
Externí odkaz:
http://arxiv.org/abs/1811.03653