Search Results for author: Philip Tully

Found 2 papers, 0 papers with code

Transformers for End-to-End InfoSec Tasks: A Feasibility Study

no code implementations5 Dec 2022 Ethan M. Rudd, Mohammad Saidur Rahman, Philip Tully

We implement transformer models for two distinct InfoSec data formats - specifically URLs and PE files - in a novel end-to-end approach, and explore a variety of architectural designs, training regimes, and experimental settings to determine the ingredients necessary for performant detection models.

Binary Classification Malware Detection

Generative Models for Spear Phishing Posts on Social Media

no code implementations14 Feb 2018 John Seymour, Philip Tully

We augment the model with clustering to triage high value targets based on their level of social engagement, and measure success of the LSTM's phishing expedition using click-rates of IP-tracked links.

Clustering Computer Security +2

Cannot find the paper you are looking for? You can Submit a new open access paper.