Search Results for author: Pete Burnap

Found 7 papers, 1 papers with code

Topic Modelling: Going Beyond Token Outputs

no code implementations16 Jan 2024 Lowri Williams, Eirini Anthi, Laura Arman, Pete Burnap

The output is commonly a set of topics consisting of isolated tokens that often co-occur in such documents.

Topic Models

Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection

no code implementations27 Oct 2023 Baskoro Adi Pratomo, Toby Jackson, Pete Burnap, Andrew Hood, Eirini Anthi

Much research on dynamic analysis focused on investigating machine-level information (e. g., CPU, memory, network usage) to identify whether a machine is running malicious activities.

Malware Detection

Design of a dynamic and self adapting system, supported with artificial intelligence, machine learning and real time intelligence for predictive cyber risk analytics in extreme environments, cyber risk in the colonisation of Mars

no code implementations19 May 2020 Petar Radanliev, David De Roure, Kevin Page, Max Van Kleek, Omar Santos, La Treall Maddox, Pete Burnap, Eirini Anthi, Carsten Maple

This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real time intelligence in edge computing.

Anomaly Detection BIG-bench Machine Learning +1

Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

no code implementations10 Apr 2020 Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury

The proliferation and application of machine learning based Intrusion Detection Systems (IDS) have allowed for more flexibility and efficiency in the automated detection of cyber attacks in Industrial Control Systems (ICS).

BIG-bench Machine Learning General Classification +1

The Enemy Among Us: Detecting Hate Speech with Threats Based 'Othering' Language Embeddings

no code implementations23 Jan 2018 Wafa Alorainy, Pete Burnap, Han Liu, Matthew Williams

Offensive or antagonistic language targeted at individuals and social groups based on their personal characteristics (also known as cyber hate speech or cyberhate) has been frequently posted and widely circulated viathe World Wide Web.

Early Stage Malware Prediction Using Recurrent Neural Networks

1 code implementation11 Aug 2017 Matilda Rhode, Pete Burnap, Kevin Jones

Static malware analysis is well-suited to endpoint anti-virus systems as it can be conducted quickly by examining the features of an executable piece of code and matching it to previously observed malicious code.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.