no code implementations • 21 Sep 2021 • Ievgeniia Kuzminykh, Dan Shevchuk, Stavros Shiaeles, Bogdan Ghita
Two tests are conducted to evaluate the performance of the models on two separate problems: audio classification and intervals retrieval based on a natural language query.
no code implementations • 20 Sep 2021 • Christos Constantinides, Stavros Shiaeles, Bogdan Ghita, Nicholas Kolokotronis
Attack vectors are continuously evolving in order to evade Intrusion Detection systems.
no code implementations • 8 Sep 2021 • Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan Ghita, Nicholas Kolokotronis
Internet of Things devices have seen a rapid growth and popularity in recent years with many more ordinary devices gaining network capability and becoming part of the ever growing IoT network.
no code implementations • 6 Sep 2021 • Vasileios Koutsouvelis, Stavros Shiaeles, Bogdan Ghita, Gueltoum Bendiab
Insider threats are one of the most damaging risk factors for the IT systems and infrastructure of a company or an organization; identification of insider threats has prompted the interest of the world academic research community, with several solutions having been proposed to alleviate their potential impact.
no code implementations • 12 Mar 2019 • Michael Siracusano, Stavros Shiaeles, Bogdan Ghita
Low-rate application layer distributed denial of service (LDDoS) attacks are both powerful and stealthy.
no code implementations • 12 Mar 2019 • Muhammad Ali, Stavros Shiaeles, Maria Papadaki, Bogdan Ghita
Malicious software is detected and classified by either static analysis or dynamic analysis.