Search Results for author: Eirini Anthi

Found 5 papers, 0 papers with code

Topic Modelling: Going Beyond Token Outputs

no code implementations16 Jan 2024 Lowri Williams, Eirini Anthi, Laura Arman, Pete Burnap

The output is commonly a set of topics consisting of isolated tokens that often co-occur in such documents.

Topic Models

Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection

no code implementations27 Oct 2023 Baskoro Adi Pratomo, Toby Jackson, Pete Burnap, Andrew Hood, Eirini Anthi

Much research on dynamic analysis focused on investigating machine-level information (e. g., CPU, memory, network usage) to identify whether a machine is running malicious activities.

Malware Detection

Federated Deep Learning for Intrusion Detection in IoT Networks

no code implementations5 Jun 2023 Othmane Belarbi, Theodoros Spyridopoulos, Eirini Anthi, Ioannis Mavromatis, Pietro Carnelli, Aftab Khan

The comparison shows that the heterogeneous nature of the data has a considerable negative impact on the model's performance when trained in a distributed manner.

Federated Learning Intrusion Detection

Design of a dynamic and self adapting system, supported with artificial intelligence, machine learning and real time intelligence for predictive cyber risk analytics in extreme environments, cyber risk in the colonisation of Mars

no code implementations19 May 2020 Petar Radanliev, David De Roure, Kevin Page, Max Van Kleek, Omar Santos, La Treall Maddox, Pete Burnap, Eirini Anthi, Carsten Maple

This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real time intelligence in edge computing.

Anomaly Detection BIG-bench Machine Learning +1

Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

no code implementations10 Apr 2020 Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury

The proliferation and application of machine learning based Intrusion Detection Systems (IDS) have allowed for more flexibility and efficiency in the automated detection of cyber attacks in Industrial Control Systems (ICS).

BIG-bench Machine Learning General Classification +1

Cannot find the paper you are looking for? You can Submit a new open access paper.