no code implementations • 26 Apr 2021 • Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan
As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially.
1 code implementation • 29 Mar 2021 • Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan
A common privacy issue in traditional machine learning is that data needs to be disclosed for the training procedures.
1 code implementation • 3 Jun 2020 • Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan
Privacy-preserving techniques distribute computation in order to ensure that data remains in the control of the owner while learning takes place.
1 code implementation • 13 May 2020 • Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan
Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate.