no code implementations • 16 Jan 2024 • Lowri Williams, Eirini Anthi, Laura Arman, Pete Burnap
The output is commonly a set of topics consisting of isolated tokens that often co-occur in such documents.
no code implementations • 27 Oct 2023 • Baskoro Adi Pratomo, Toby Jackson, Pete Burnap, Andrew Hood, Eirini Anthi
Much research on dynamic analysis focused on investigating machine-level information (e. g., CPU, memory, network usage) to identify whether a machine is running malicious activities.
no code implementations • 5 Jun 2023 • Othmane Belarbi, Theodoros Spyridopoulos, Eirini Anthi, Ioannis Mavromatis, Pietro Carnelli, Aftab Khan
The comparison shows that the heterogeneous nature of the data has a considerable negative impact on the model's performance when trained in a distributed manner.
no code implementations • 19 May 2020 • Petar Radanliev, David De Roure, Kevin Page, Max Van Kleek, Omar Santos, La Treall Maddox, Pete Burnap, Eirini Anthi, Carsten Maple
This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real time intelligence in edge computing.
no code implementations • 10 Apr 2020 • Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury
The proliferation and application of machine learning based Intrusion Detection Systems (IDS) have allowed for more flexibility and efficiency in the automated detection of cyber attacks in Industrial Control Systems (ICS).