A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hybrid Deep Learning Model using SPCAGAN Augmentation for Insider Threat Analysis
[article]
2022
arXiv
pre-print
Results demonstrate that our proposed approach has a lower error, is more accurate, and generates substantially superior synthetic insider threat data than previous models. ...
We propose a linear manifold learning-based generative adversarial network, SPCAGAN, that takes input from heterogeneous data sources and adds a novel loss function to train the generator to produce high-quality ...
FGSM [49] combines a white-box approach with a misclassification goal, and it tricks a neural network model into making wrong predictions. ...
arXiv:2203.02855v1
fatcat:naeat2lz4jg65bp2gaw2tzp25q
Collective Spammer Detection in Evolving Multi-Relational Social Networks
2015
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD '15
We leverage relational sequence information using k -gram features and probabilistic modelling with a mixture of Markov models. ...
To identify spammer accounts, our approach makes use of structural features, sequence modelling, and collective reasoning. ...
We also proposed a collective model to refine and improve the signals from the abuse report graph. ...
doi:10.1145/2783258.2788606
dblp:conf/kdd/FakhraeiFSG15
fatcat:zphngrjmbnf6pkp7d5h7ln2khu
UAV-aided RF Mapping for Sensing and Connectivity in Wireless Networks
[article]
2022
arXiv
pre-print
The use of unmanned aerial vehicles (UAV) as flying radio access network (RAN) nodes offers a promising complement to traditional fixed terrestrial deployments. ...
In practice, the selection of a proper location or trajectory for the UAV very much depends on local terrain features, including the position of surrounding radio obstacles. ...
As an alternative to probabilistic channel models, trajectory design can instead exploit channel prediction based on local terrain features. ...
arXiv:2205.03335v1
fatcat:pf4anfp6xbbcle7jgah4lg5jze
A recent review of conventional vs. automated cybersecurity anti-phishing techniques
2018
Computer Science Review
Using this technology, a classification system is integrated in the browser in which it will detect phishing activities and communicate these with the end user. ...
A more promising anti-phishing approach is to prevent phishing attacks using intelligent machine learning (ML) technology. ...
classification approaches such as C4.5 and probabilistic approaches. ...
doi:10.1016/j.cosrev.2018.05.003
fatcat:bhjdlfyfhzgefoxiz2doj5y524
Tensor factorization toward precision medicine
2016
Briefings in Bioinformatics
Tensor factorizations extend the matrix view to multiple modalities and support dimensionality reduction methods that identify latent groups of data for meaningful summarization of both features and instances ...
Integrating stochastic processes into tensor factorization represents a theoretically appealing approach toward modeling temporality, but related work with biomedical applications is still in its infancy ...
For Permissions, please email: journals.permissions@oup.com
Figure 1 . 1 Tensor modeling and factorization schemes. ...
doi:10.1093/bib/bbw026
pmid:26994614
pmcid:PMC6078180
fatcat:cckfbgzrxjd6diwtlxjsdob4h4
Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution
2022
Wireless Communications and Mobile Computing
Furthermore, it merges attacker features and probabilistic attack graphs in the simulation to improve TMS performance. ...
Threat modeling and simulation (TMS) was aimed at dynamically capturing the features of attacks, which is a challenging job in complex Industrial Internet of Things (IIoT) control systems due to the complicated ...
TTC set (T ttci ); Output: TRMLang model with integrated TTCG generation network. ...
doi:10.1155/2022/2323228
fatcat:cc4onzjbujbftkw2llazebgqka
ICT Security Risk Management: Economic Perspectives
2014
Position Papers of the 2014 Federated Conference on Computer Science and Information Systems
From the economic perspective, this situation requires various basic research approaches to be taken to increase ICT security. ...
These include an improved understanding of the far-reaching, highly interconnected consequences of ICT security incidents, development of methodologically sound measures of ICT security risk as well as approaches ...
Fig. 1 illustrates important realistic features of the quantitative account of risk assessment. ...
doi:10.15439/2014f439
dblp:conf/fedcsis/Geiger14
fatcat:6zbxyjq6hbeaxmp7l5ztrcu2nu
Mining Divergent Opinion Trust Networks through Latent Dirichlet Allocation
2012
2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
in a social network. ...
To acquire feature sets from topics discussed in a discussion we use a very successful topic modeling technique, namely Latent Dirichlet Allocation (LDA). ...
Then D KL (Q||P ) can model a network of two nodes Q and P , with a directed edge from Q towards P weighting as |D KL (Q||P )|. ...
doi:10.1109/asonam.2012.158
dblp:conf/asunam/DokoohakiM12
fatcat:jqa5jbgrhfdhdo7wafjouevvny
phishGILLNET—phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training
2012
EURASIP Journal on Information Security
The first layer (phishGILLNET1) employs Probabilistic Latent Semantic Analysis (PLSA) to build a topic model. ...
The topic model handles synonym (multiple words with similar meaning), polysemy (words with multiple meanings), and other linguistic variations found in phishing. ...
Most of the above research is limited to website detection; however, we propose a generic content-based approach that can be applied to email, web pages, blogs, and social networking posts. ...
doi:10.1186/1687-417x-2012-1
fatcat:q2e6behmzrd4jg5uwoskxl3gni
Effective Unsupervised Author Disambiguation with Relative Frequencies
2018
Proceedings of the 18th ACM/IEEE on Joint Conference on Digital Libraries - JCDL '18
Aiming for an efficient, simple and straightforward solution, we introduce a novel probabilistic similarity measure for author name disambiguation based on feature overlap. ...
Our model shows state-of-the-art performance for all correct clustering sizes without any discriminative training and with tuning only one convergence parameter. ...
On the small sample used, this accuracy introduces a very high baseline. Probabilistic Approaches, Topic Models. Han et al. ...
doi:10.1145/3197026.3197036
dblp:conf/jcdl/Backes18
fatcat:xr663ifmszepneawcapreefboi
PRIS Kidult Anti-SPAM Solution at the TREC 2005 Spam Track: Improving the Performance of Naive Bayes for Spam Detection
2005
Text Retrieval Conference
Then the approaches to modify the Naive Bayes by simply introducing weight and classifier assemble based on dynamic threshold are proposed, which can help to improve the accuracy of a Naive Bayes spam ...
Additionally, we discuss some steps that must be adopted naturally thought before, such as stop list, word stemming, feature selection, class prior probabilities. ...
(or the probabilistic model) [11] [23] . ...
dblp:conf/trec/YangXCHG05
fatcat:jnsmkqrjcbf67jyebnmzg64wsm
A Smart and Defensive Human-Machine Approach to Code Analysis
[article]
2021
arXiv
pre-print
In this research, we propose a method that employs the use of virtual assistants to work with programmers to ensure that software are as safe as possible in order to protect safety-critical systems from ...
Static analysis remains one of the most popular approaches for detecting and correcting poor or vulnerable program code. ...
Topic Models A topic model is a generative model for documents, which specifies a probabilistic procedure by which documents can be generated [Steyvers and Griffiths, 2007] . ...
arXiv:2108.03294v3
fatcat:enibrdl3yrcc3pbqk7jjzm465i
Probabilistic spatial mapping and curve tracking in distributed multi-agent systems
2012
2012 IEEE International Conference on Robotics and Automation
As opposed to assuming the independence of spatial features (e.g. an occupancy grid model), we adopt a novel model of spatial dependence based on the grid-structured Markov random field that exploits spatial ...
In this paper we consider a probabilistic method for mapping a spatial process over a distributed multi-agent system and a coordinated level curve tracking algorithm for adaptive sampling. ...
The feasibility of the approach in realistic multi-agent deployments is suggested by acceptable scaling and computational complexity over reasonably sized agent networks and workspaces. ...
doi:10.1109/icra.2012.6224689
dblp:conf/icra/WilliamsS12
fatcat:5qh7oa6hsjb53o5jqvvidcdj2y
How to Test DoS Defenses
2009
2009 Cybersecurity Applications & Technology Conference for Homeland Security
The attack can be performed by a single attacking machine -DoS - ...
This paper surveys existing approaches and criticizes their simplicity and the lack of realism. ...
research questions, but with realistic models. ...
doi:10.1109/catch.2009.23
fatcat:43y7so6uqveixdsyvft5a2gegq
Symbiotic filtering for spam email detection
2011
Expert systems with applications
SF is an hybrid approach combining some features from both Collaborative (CF) and Content-Based Filtering (CBF). ...
A comparison is performed against the commonly used Naive Bayes CBF algorithm. Several experiments were held with the well-known Enron data, under both fixed and incremental symbiotic groups. ...
This procedure is more realistic than the simple 50% train/test split adopted in (Zhong et al., 2008) . The predicted class for a probabilistic filter is given by Fig. 4 . ...
doi:10.1016/j.eswa.2011.01.174
fatcat:qrdek3bf7ndupknasdekpqegni
« Previous
Showing results 1 — 15 out of 4,718 results