no code implementations • 16 Jan 2024 • Lowri Williams, Eirini Anthi, Laura Arman, Pete Burnap
The output is commonly a set of topics consisting of isolated tokens that often co-occur in such documents.
no code implementations • 27 Oct 2023 • Baskoro Adi Pratomo, Toby Jackson, Pete Burnap, Andrew Hood, Eirini Anthi
Much research on dynamic analysis focused on investigating machine-level information (e. g., CPU, memory, network usage) to identify whether a machine is running malicious activities.
no code implementations • 19 May 2020 • Petar Radanliev, David De Roure, Kevin Page, Max Van Kleek, Omar Santos, La Treall Maddox, Pete Burnap, Eirini Anthi, Carsten Maple
This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real time intelligence in edge computing.
no code implementations • LREC 2020 • Han Liu, Pete Burnap, Wafa Alorainy, Matthew Williams
This paper presents a system developed during our participation (team name: scmhl5) in the TRAC-2 Shared Task on aggression identification.
no code implementations • 10 Apr 2020 • Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury
The proliferation and application of machine learning based Intrusion Detection Systems (IDS) have allowed for more flexibility and efficiency in the automated detection of cyber attacks in Industrial Control Systems (ICS).
no code implementations • 23 Jan 2018 • Wafa Alorainy, Pete Burnap, Han Liu, Matthew Williams
Offensive or antagonistic language targeted at individuals and social groups based on their personal characteristics (also known as cyber hate speech or cyberhate) has been frequently posted and widely circulated viathe World Wide Web.
1 code implementation • 11 Aug 2017 • Matilda Rhode, Pete Burnap, Kevin Jones
Static malware analysis is well-suited to endpoint anti-virus systems as it can be conducted quickly by examining the features of an executable piece of code and matching it to previously observed malicious code.
Cryptography and Security