Filters








4,718 Hits in 4.3 sec

Hybrid Deep Learning Model using SPCAGAN Augmentation for Insider Threat Analysis [article]

R G Gayathri, Atul Sajjanhar, Yong Xiang
2022 arXiv   pre-print
Results demonstrate that our proposed approach has a lower error, is more accurate, and generates substantially superior synthetic insider threat data than previous models.  ...  We propose a linear manifold learning-based generative adversarial network, SPCAGAN, that takes input from heterogeneous data sources and adds a novel loss function to train the generator to produce high-quality  ...  FGSM [49] combines a white-box approach with a misclassification goal, and it tricks a neural network model into making wrong predictions.  ... 
arXiv:2203.02855v1 fatcat:naeat2lz4jg65bp2gaw2tzp25q

Collective Spammer Detection in Evolving Multi-Relational Social Networks

Shobeir Fakhraei, James Foulds, Madhusudana Shashanka, Lise Getoor
2015 Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD '15  
We leverage relational sequence information using k -gram features and probabilistic modelling with a mixture of Markov models.  ...  To identify spammer accounts, our approach makes use of structural features, sequence modelling, and collective reasoning.  ...  We also proposed a collective model to refine and improve the signals from the abuse report graph.  ... 
doi:10.1145/2783258.2788606 dblp:conf/kdd/FakhraeiFSG15 fatcat:zphngrjmbnf6pkp7d5h7ln2khu

UAV-aided RF Mapping for Sensing and Connectivity in Wireless Networks [article]

David Gesbert, Omid Esrafilian, Junting Chen, Rajeev Gangula, Urbashi Mitra
2022 arXiv   pre-print
The use of unmanned aerial vehicles (UAV) as flying radio access network (RAN) nodes offers a promising complement to traditional fixed terrestrial deployments.  ...  In practice, the selection of a proper location or trajectory for the UAV very much depends on local terrain features, including the position of surrounding radio obstacles.  ...  As an alternative to probabilistic channel models, trajectory design can instead exploit channel prediction based on local terrain features.  ... 
arXiv:2205.03335v1 fatcat:pf4anfp6xbbcle7jgah4lg5jze

A recent review of conventional vs. automated cybersecurity anti-phishing techniques

Issa Qabajeh, Fadi Thabtah, Francisco Chiclana
2018 Computer Science Review  
Using this technology, a classification system is integrated in the browser in which it will detect phishing activities and communicate these with the end user.  ...  A more promising anti-phishing approach is to prevent phishing attacks using intelligent machine learning (ML) technology.  ...  classification approaches such as C4.5 and probabilistic approaches.  ... 
doi:10.1016/j.cosrev.2018.05.003 fatcat:bhjdlfyfhzgefoxiz2doj5y524

Tensor factorization toward precision medicine

Yuan Luo, Fei Wang, Peter Szolovits
2016 Briefings in Bioinformatics  
Tensor factorizations extend the matrix view to multiple modalities and support dimensionality reduction methods that identify latent groups of data for meaningful summarization of both features and instances  ...  Integrating stochastic processes into tensor factorization represents a theoretically appealing approach toward modeling temporality, but related work with biomedical applications is still in its infancy  ...  For Permissions, please email: journals.permissions@oup.com Figure 1 . 1 Tensor modeling and factorization schemes.  ... 
doi:10.1093/bib/bbw026 pmid:26994614 pmcid:PMC6078180 fatcat:cckfbgzrxjd6diwtlxjsdob4h4

Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution

Shuqin Zhang, Shijie Wang, Guangyao Bai, Minzhi Zhang, Peng Chen, Chunxia Zhao, Shuhan Li, Jiehan Zhou, Zhiguo Qu
2022 Wireless Communications and Mobile Computing  
Furthermore, it merges attacker features and probabilistic attack graphs in the simulation to improve TMS performance.  ...  Threat modeling and simulation (TMS) was aimed at dynamically capturing the features of attacks, which is a challenging job in complex Industrial Internet of Things (IIoT) control systems due to the complicated  ...  TTC set (T ttci ); Output: TRMLang model with integrated TTCG generation network.  ... 
doi:10.1155/2022/2323228 fatcat:cc4onzjbujbftkw2llazebgqka

ICT Security Risk Management: Economic Perspectives

Gebhard Geiger
2014 Position Papers of the 2014 Federated Conference on Computer Science and Information Systems  
From the economic perspective, this situation requires various basic research approaches to be taken to increase ICT security.  ...  These include an improved understanding of the far-reaching, highly interconnected consequences of ICT security incidents, development of methodologically sound measures of ICT security risk as well as approaches  ...  Fig. 1 illustrates important realistic features of the quantitative account of risk assessment.  ... 
doi:10.15439/2014f439 dblp:conf/fedcsis/Geiger14 fatcat:6zbxyjq6hbeaxmp7l5ztrcu2nu

Mining Divergent Opinion Trust Networks through Latent Dirichlet Allocation

N. Dokoohaki, M. Matskin
2012 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining  
in a social network.  ...  To acquire feature sets from topics discussed in a discussion we use a very successful topic modeling technique, namely Latent Dirichlet Allocation (LDA).  ...  Then D KL (Q||P ) can model a network of two nodes Q and P , with a directed edge from Q towards P weighting as |D KL (Q||P )|.  ... 
doi:10.1109/asonam.2012.158 dblp:conf/asunam/DokoohakiM12 fatcat:jqa5jbgrhfdhdo7wafjouevvny

phishGILLNET—phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training

Venkatesh Ramanathan, Harry Wechsler
2012 EURASIP Journal on Information Security  
The first layer (phishGILLNET1) employs Probabilistic Latent Semantic Analysis (PLSA) to build a topic model.  ...  The topic model handles synonym (multiple words with similar meaning), polysemy (words with multiple meanings), and other linguistic variations found in phishing.  ...  Most of the above research is limited to website detection; however, we propose a generic content-based approach that can be applied to email, web pages, blogs, and social networking posts.  ... 
doi:10.1186/1687-417x-2012-1 fatcat:q2e6behmzrd4jg5uwoskxl3gni

Effective Unsupervised Author Disambiguation with Relative Frequencies

Tobias Backes
2018 Proceedings of the 18th ACM/IEEE on Joint Conference on Digital Libraries - JCDL '18  
Aiming for an efficient, simple and straightforward solution, we introduce a novel probabilistic similarity measure for author name disambiguation based on feature overlap.  ...  Our model shows state-of-the-art performance for all correct clustering sizes without any discriminative training and with tuning only one convergence parameter.  ...  On the small sample used, this accuracy introduces a very high baseline. Probabilistic Approaches, Topic Models. Han et al.  ... 
doi:10.1145/3197026.3197036 dblp:conf/jcdl/Backes18 fatcat:xr663ifmszepneawcapreefboi

PRIS Kidult Anti-SPAM Solution at the TREC 2005 Spam Track: Improving the Performance of Naive Bayes for Spam Detection

Zhen Yang, Weiran Xu, Bo Chen, Jiani Hu, Jun Guo
2005 Text Retrieval Conference  
Then the approaches to modify the Naive Bayes by simply introducing weight and classifier assemble based on dynamic threshold are proposed, which can help to improve the accuracy of a Naive Bayes spam  ...  Additionally, we discuss some steps that must be adopted naturally thought before, such as stop list, word stemming, feature selection, class prior probabilities.  ...  (or the probabilistic model) [11] [23] .  ... 
dblp:conf/trec/YangXCHG05 fatcat:jnsmkqrjcbf67jyebnmzg64wsm

A Smart and Defensive Human-Machine Approach to Code Analysis [article]

Fitzroy D. Nembhard, Marco M. Carvalho
2021 arXiv   pre-print
In this research, we propose a method that employs the use of virtual assistants to work with programmers to ensure that software are as safe as possible in order to protect safety-critical systems from  ...  Static analysis remains one of the most popular approaches for detecting and correcting poor or vulnerable program code.  ...  Topic Models A topic model is a generative model for documents, which specifies a probabilistic procedure by which documents can be generated [Steyvers and Griffiths, 2007] .  ... 
arXiv:2108.03294v3 fatcat:enibrdl3yrcc3pbqk7jjzm465i

Probabilistic spatial mapping and curve tracking in distributed multi-agent systems

Ryan K. Williams, Gaurav S. Sukhatme
2012 2012 IEEE International Conference on Robotics and Automation  
As opposed to assuming the independence of spatial features (e.g. an occupancy grid model), we adopt a novel model of spatial dependence based on the grid-structured Markov random field that exploits spatial  ...  In this paper we consider a probabilistic method for mapping a spatial process over a distributed multi-agent system and a coordinated level curve tracking algorithm for adaptive sampling.  ...  The feasibility of the approach in realistic multi-agent deployments is suggested by acceptable scaling and computational complexity over reasonably sized agent networks and workspaces.  ... 
doi:10.1109/icra.2012.6224689 dblp:conf/icra/WilliamsS12 fatcat:5qh7oa6hsjb53o5jqvvidcdj2y

How to Test DoS Defenses

Jelena Mirkovic, Sonia Fahmy, Peter Reiher, Roshan K. Thomas
2009 2009 Cybersecurity Applications & Technology Conference for Homeland Security  
The attack can be performed by a single attacking machine -DoS -  ...  This paper surveys existing approaches and criticizes their simplicity and the lack of realism.  ...  research questions, but with realistic models.  ... 
doi:10.1109/catch.2009.23 fatcat:43y7so6uqveixdsyvft5a2gegq

Symbiotic filtering for spam email detection

Clotilde Lopes, Paulo Cortez, Pedro Sousa, Miguel Rocha, Miguel Rio
2011 Expert systems with applications  
SF is an hybrid approach combining some features from both Collaborative (CF) and Content-Based Filtering (CBF).  ...  A comparison is performed against the commonly used Naive Bayes CBF algorithm. Several experiments were held with the well-known Enron data, under both fixed and incremental symbiotic groups.  ...  This procedure is more realistic than the simple 50% train/test split adopted in (Zhong et al., 2008) . The predicted class for a probabilistic filter is given by Fig. 4 .  ... 
doi:10.1016/j.eswa.2011.01.174 fatcat:qrdek3bf7ndupknasdekpqegni
« Previous Showing results 1 — 15 out of 4,718 results