no code implementations • 8 Aug 2019 • Sourav Mukherjee, Tim Oates, Ryan Wright
In this paper, we demonstrate that semantic information can play a useful role in computing graph embeddings.
1 code implementation • 17 Jun 2019 • Ghita Berrada, Sidahmed Benabderrahmane, James Cheney, William Maxwell, Himan Mookherjee, Alec Theriault, Ryan Wright
Advanced persistent threats (APT) are stealthy, sophisticated, and unpredictable cyberattacks that can steal intellectual property, damage critical infrastructure, or cause millions of dollars in damage.
Cryptography and Security