no code implementations • 19 Jul 2018 • Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Joshi
We create a neural network based system that takes in cybersecurity data in a different language and outputs the respective English translation.
no code implementations • 8 Feb 2021 • Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin
We evaluate with traditional approaches and conduct a human evaluation study with cybersecurity professionals and threat hunters.
no code implementations • 2 Aug 2022 • Casey Hanks, Michael Maiden, Priyanka Ranade, Tim Finin, Anupam Joshi
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attacks and is often used as training data for AI-based cyber defense systems such as Cybersecurity Knowledge Graphs (CKG).
no code implementations • 9 Oct 2023 • Michael Benington, Leo Phan, Chris Pierre Paul, Evan Shoemaker, Priyanka Ranade, Torstein Collett, Grant Hodgson Perez, Christopher Krieger
AI accelerator processing capabilities and memory constraints largely dictate the scale in which machine learning workloads (e. g., training and inference) can be executed within a desirable time frame.
no code implementations • 20 Oct 2023 • Priyanka Ranade, Anupam Joshi
Intelligence analysis is an example of a domain that can benefit tremendously from narrative construction techniques, particularly in aiding analysts during the largely manual and costly process of synthesizing event information into comprehensive intelligence reports.