no code implementations • 5 Dec 2022 • Ethan M. Rudd, Mohammad Saidur Rahman, Philip Tully
We implement transformer models for two distinct InfoSec data formats - specifically URLs and PE files - in a novel end-to-end approach, and explore a variety of architectural designs, training regimes, and experimental settings to determine the ingredients necessary for performant detection models.
no code implementations • 14 Feb 2018 • John Seymour, Philip Tully
We augment the model with clustering to triage high value targets based on their level of social engagement, and measure success of the LSTM's phishing expedition using click-rates of IP-tracked links.