Search Results

Structural Generalization in Autonomous Cyber Incident Response with Message-Passing Neural Networks and Reinforcement Learning

2 code implementations8 Jul 2024

We believe that agents for automated incident response based on machine learning need to handle changes in network structure.

Incidents1M: a large-scale dataset of images with natural disasters, damage, and incidents

1 code implementation11 Jan 2022

In this work, we present the Incidents1M Dataset, a large-scale multi-label dataset which contains 977, 088 images, with 43 incident and 49 place categories.

Humanitarian

An In-memory Embedding of CPython for Offensive Use

1 code implementation28 Mar 2021

We intend for our work to be used by security researchers to rapidly develop and deploy offensive techniques that is difficult for security products to analyze given these instructions are in bytecode and only translated to machine-code by the interpreter immediately prior to execution.

Cryptography and Security Software Engineering D.2

ChatGPT for Digital Forensic Investigation: The Good, The Bad, and The Unknown

1 code implementation10 Jul 2023

The disruptive application of ChatGPT (GPT-3. 5, GPT-4) to a variety of domains has become a topic of much discussion in the scientific community and society at large.

Anomaly Detection Code Generation

SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence

1 code implementation6 May 2024

To address the increasing complexity and frequency of cybersecurity incidents emphasized by the recent cybersecurity threat reports with over 10 billion instances, cyber threat intelligence (CTI) plays a critical role in the modern cybersecurity landscape by offering the insights required to understand and combat the constantly evolving nature of cyber threats.

Cryptography and Security

Toward interoperable representation and sharing of disinformation incidents in cyber threat intelligence

1 code implementation28 Feb 2025

A key countermeasure in cybersecurity has been the development of standardized computational protocols for modeling and sharing cyber threat intelligence (CTI) between organizations, enabling a shared understanding of threats and coordinated global responses.

Cryptography and Security Emerging Technologies Social and Information Networks

Open-Ended Wargames with Large Language Models

1 code implementation17 Apr 2024

We introduce "Snow Globe," an LLM-powered multi-agent system for playing qualitative wargames.

Decision Making

The resonant dynamics of arbitrarily-shaped meta-atoms

1 code implementation15 May 2014

This gives a clear physical interpretation of the modes, and enables their conduction or polarization current distribution to be calculated numerically for particles of arbitrary shape.

Optics

Runaway Feedback Loops in Predictive Policing

1 code implementation29 Jun 2017

Predictive policing systems are increasingly used to determine how to allocate police across a city in order to best prevent crime.

LADI v2: Multi-label Dataset and Classifiers for Low-Altitude Disaster Imagery

1 code implementation4 Jun 2024

ML-based computer vision models are promising tools for supporting emergency management operations following natural disasters.

Management Multi-Label Classification +2