no code implementations • 16 Jan 2024 • Lowri Williams, Eirini Anthi, Laura Arman, Pete Burnap
The output is commonly a set of topics consisting of isolated tokens that often co-occur in such documents.
no code implementations • 10 Apr 2020 • Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury
The proliferation and application of machine learning based Intrusion Detection Systems (IDS) have allowed for more flexibility and efficiency in the automated detection of cyber attacks in Industrial Control Systems (ICS).