no code implementations • 20 Mar 2023 • Roelien C. Timmer, Fech Scen Khoo, Megan Mark, Marcella Scoczynski Ribeiro Martins, Anamaria Berea, Gregory Renard, Kaylin Bugbee
The size of the National Aeronautics and Space Administration (NASA) Science Mission Directorate (SMD) is growing exponentially, allowing researchers to make discoveries.
no code implementations • 15 Aug 2022 • David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar
Deception is rapidly growing as an important tool for cyber defence, complementing existing perimeter security measures to rapidly detect breaches and data theft.
no code implementations • 15 Mar 2022 • Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil Kanhere
Honeyfile deployment is a useful breach detection method in cyber deception that can also inform defenders about the intent and interests of intruders and malicious insiders.
no code implementations • 14 Mar 2022 • Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere
We experimented with four different categories of documents in the Monsanto dataset and observed that BERT achieves better F2 scores by 24. 13\% to 65. 79\% for GHOST, 30. 14\% to 54. 88\% for TOXIC, 39. 22\% for CHEMI, 53. 57\% for REGUL compared to existing sensitive information detection models.