no code implementations • 7 Apr 2024 • David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba
Honeyfiles are a type of honeypot that mimic real, sensitive documents, creating the illusion of the presence of valuable data.
1 code implementation • 18 Dec 2023 • David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere
In many real-world applications, from robotics to pedestrian trajectory prediction, there is a need to predict multiple real-valued outputs to represent several potential scenarios.
no code implementations • 30 May 2023 • Keerth Rathakumar, David Liebowitz, Christian Walder, Kristen Moore, Salil S. Kanhere
The disentangled representation is obtained by two novel mechanisms: (i) a dual branch architecture that separates image colour attributes from geometric attributes, and (ii) a new ELBO that trains the combined colour and geometry representations.
no code implementations • 15 Aug 2022 • David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar
Deception is rapidly growing as an important tool for cyber defence, complementing existing perimeter security measures to rapidly detect breaches and data theft.
no code implementations • 15 Mar 2022 • Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil Kanhere
Honeyfile deployment is a useful breach detection method in cyber deception that can also inform defenders about the intent and interests of intruders and malicious insiders.
no code implementations • 14 Mar 2022 • Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere
We experimented with four different categories of documents in the Monsanto dataset and observed that BERT achieves better F2 scores by 24. 13\% to 65. 79\% for GHOST, 30. 14\% to 54. 88\% for TOXIC, 39. 22\% for CHEMI, 53. 57\% for REGUL compared to existing sensitive information detection models.
no code implementations • 24 Nov 2021 • Cody James Christopher, Kristen Moore, David Liebowitz
In this paper we introduce the SchemaDB data-set; a collection of relational database schemata in both sql and graph formats.
no code implementations • 21 Nov 2021 • Kristen Moore, Cody J. Christopher, David Liebowitz, Surya Nepal, Renee Selvey
Cyber deception is emerging as a promising approach to defending networks and systems against attackers and data thieves.