no code implementations • 3 Nov 2021 • Erik Larsen, Korey MacVittie, John Lilly
This work explores the use of machine learning techniques on an Internet-of-Things firmware dataset to detect malicious attempts to infect edge devices or subsequently corrupt an entire network.
no code implementations • 3 Nov 2021 • Erik Larsen, Korey MacVittie, John Lilly
Cyber security can be enhanced through application of machine learning by recasting network attack data into an image format, then applying supervised computer vision and other machine learning techniques to detect malicious specimens.
no code implementations • 3 Nov 2021 • Erik Larsen, Korey MacVittie, John Lilly
The Virus-MNIST data set is a collection of thumbnail images that is similar in style to the ubiquitous MNIST hand-written digits.
no code implementations • 14 Oct 2021 • Erik Larsen
High energy solar flares and coronal mass ejections have the potential to destroy Earth's ground and satellite infrastructures, causing trillions of dollars in damage and mass human suffering.
no code implementations • 14 Oct 2021 • Erik Larsen, David Noever, Korey MacVittie
A survey of machine learning techniques trained to detect ransomware is presented.
no code implementations • 1 Jul 2021 • Erik Larsen, David Noever, Korey MacVittie, John Lilly
Twenty-three machine learning algorithms were trained then scored to establish baseline comparison metrics and to select an image classification algorithm worthy of embedding into mission-critical satellite imaging systems.