Search Results for author: Alysson Bessani

Found 6 papers, 1 papers with code

Evaluation of LLM Chatbots for OSINT-based Cyber Threat Awareness

no code implementations26 Jan 2024 Samaneh Shafee, Alysson Bessani, Pedro M. Ferreira

We utilize well-established data collected in previous research from Twitter to assess the competitiveness of these chatbots when compared to specialized models trained for those tasks.

Binary Classification Chatbot +4

Smart Contracts on the Move

no code implementations13 Apr 2020 Enrique Fynn, Alysson Bessani, Fernando Pedone

To analyze the system performance we use a real trace from one of the most popular Ethereum applications and replay it in a multi-blockchain environment.

Distributed, Parallel, and Cluster Computing

Processing Tweets for Cybersecurity Threat Awareness

no code implementations3 Apr 2019 Fernando Alves, Aurélien Bettini, Pedro M. Ferreira, Alysson Bessani

Receiving timely and relevant security information is crucial for maintaining a high-security level on an IT infrastructure.

Binary Classification Clustering

Cyberthreat Detection from Twitter using Deep Neural Networks

1 code implementation1 Apr 2019 Nuno Dionísio, Fernando Alves, Pedro M. Ferreira, Alysson Bessani

A convolutional neural network identifies tweets containing security-related information relevant to assets in an IT infrastructure.

Management named-entity-recognition +2

A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform

no code implementations20 Sep 2017 João Sousa, Alysson Bessani, Marko Vukolić

Hyperledger Fabric (HLF) is a flexible permissioned blockchain platform designed for business applications beyond the basic digital coin addressed by Bitcoin and other existing networks.

Cryptography and Security Distributed, Parallel, and Cluster Computing

Cannot find the paper you are looking for? You can Submit a new open access paper.