Search Results for author: Robert A. Bridges

Found 13 papers, 4 papers with code

Are Normalizing Flows the Key to Unlocking the Exponential Mechanism? A Path through the Accuracy-Privacy Ceiling Constraining Differentially Private ML

no code implementations15 Nov 2023 Robert A. Bridges, Vandy J. Tombs, Christopher B. Stanley

The state of the art and de facto standard for differentially private machine learning (ML) is differentially private stochastic gradient descent (DPSGD).

Detecting CAN Masquerade Attacks with Signal Clustering Similarity

no code implementations7 Jan 2022 Pablo Moriano, Robert A. Bridges, Michael D. Iannacone

Specifically, we demonstrate that masquerade attacks can be detected by computing time series clustering similarity using hierarchical clustering on the vehicle's CAN signals (time series) and comparing the clustering similarity across CAN captures with and without attacks.

Clustering Time Series +1

Time-Based CAN Intrusion Detection Benchmark

no code implementations14 Jan 2021 Deborah H. Blevins, Pablo Moriano, Robert A. Bridges, Miki E. Verma, Michael D. Iannacone, Samuel C Hollifield

Modern vehicles are complex cyber-physical systems made of hundreds of electronic control units (ECUs) that communicate over controller area networks (CANs).

Intrusion Detection

A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset

no code implementations29 Dec 2020 Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs

Current public CAN IDS datasets are limited to real fabrication (simple message injection) attacks and simulated attacks often in synthetic data, which lack fidelity.

Anomaly Detection Benchmarking +2

Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection

1 code implementation16 Dec 2020 Robert A. Bridges, Sean Oesch, Miki E. Verma, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Justin M. Beaver, Jared M. Smith, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall

In this paper, we present a scientific evaluation of four prominent malware detection tools to assist an organization with two primary questions: To what extent do ML-based tools accurately classify previously- and never-before-seen files?

Malware Detection

Active Manifolds: A non-linear analogue to Active Subspaces

1 code implementation30 Apr 2019 Robert A. Bridges, Anthony D. Gruber, Christopher Felder, Miki Verma, Chelsey Hoff

Overall, AM represents a novel technique for analyzing functional models with benefits including: reducing $m$-dimensional analysis to a 1-D analogue, permitting more accurate regression than AS (at more computational expense), enabling more informative sensitivity analysis, and granting accessible visualizations(2-D plots) of parameter sensitivity along the AM.

Forming IDEAS Interactive Data Exploration & Analysis System

no code implementations24 May 2018 Robert A. Bridges, Maria A. Vincent, Kelly M. T. Huffer, John R. Goodall, Jessie D. Jamieson, Zachary Burch

Our hypothesis is that arming the analyst with easy-to-use data science tools will increase their work efficiency, provide them with the ability to resolve hypotheses with scientific inquiry of their data, and support their decisions with evidence over intuition.

Dimension Reduction Using Active Manifolds

no code implementations7 Feb 2018 Robert A. Bridges, Chris Felder, Chelsey Hoff

This project was inspired by an approach known as Active Subspaces, which works by linearly projecting to a linear subspace where the function changes most on average.

Dimensionality Reduction

Towards a relation extraction framework for cyber-security concepts

1 code implementation16 Apr 2015 Corinne L. Jones, Robert A. Bridges, Kelly Huffer, John Goodall

In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed.

Active Learning Information Retrieval +3

Multi-Level Anomaly Detection on Time-Varying Graph Data

no code implementations16 Oct 2014 Robert A. Bridges, John Collins, Erik M. Ferragut, Jason Laska, Blair D. Sullivan

This work presents a novel modeling and analysis framework for graph sequences which addresses the challenge of detecting and contextualizing anomalies in labelled, streaming graph data.

Graph Anomaly Detection

Automatic Labeling for Entity Extraction in Cyber Security

3 code implementations22 Aug 2013 Robert A. Bridges, Corinne L. Jones, Michael D. Iannacone, Kelly M. Testa, John R. Goodall

Timely analysis of cyber-security information necessitates automated information extraction from unstructured text.

Entity Extraction using GAN

PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts

no code implementations21 Aug 2013 Nikki McNeil, Robert A. Bridges, Michael D. Iannacone, Bogdan Czejdo, Nicolas Perez, John R. Goodall

Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources months before proper classification into structured databases.

Entity Extraction using GAN General Classification

Cannot find the paper you are looking for? You can Submit a new open access paper.