Search Results

Automatic Labeling for Entity Extraction in Cyber Security

3 code implementations22 Aug 2013

Timely analysis of cyber-security information necessitates automated information extraction from unstructured text.

Entity Extraction using GAN

The Path To Autonomous Cyber Defense

1 code implementation12 Apr 2024

Defenders are overwhelmed by the number and scale of attacks against their networks. This problem will only be exacerbated as attackers leverage artificial intelligence to automate their workflows.

Developing Optimal Causal Cyber-Defence Agents via Cyber Security Simulation

3 code implementations25 Jul 2022

In this paper we explore cyber security defence, through the unification of a novel cyber security simulator with models for (causal) decision-making through optimisation.

Bayesian Optimisation Decision Making

SROS2: Usable Cyber Security Tools for ROS 2

1 code implementation4 Aug 2022

Built upon DDS as its default communication middleware and used in safety-critical scenarios, adding security to robots and ROS computational graphs is increasingly becoming a concern.

Cryptography and Security Distributed, Parallel, and Cluster Computing Networking and Internet Architecture Robotics Software Engineering

Fundamental Challenges of Cyber-Physical Systems Security Modeling

1 code implementation30 Apr 2020

Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design.

Cryptography and Security Systems and Control Systems and Control

A Model-Based Approach to Security Analysis for Cyber-Physical Systems

1 code implementation31 Oct 2017

To construct such a model we produce a taxonomy of attributes; that is, a generalized schema for system attributes.

Cryptography and Security Systems and Control Systems and Control

Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis

1 code implementation24 Aug 2018

Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards.

Human-Computer Interaction Cryptography and Security

Towards a relation extraction framework for cyber-security concepts

1 code implementation16 Apr 2015

In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed.

Active Learning Information Retrieval +3

Active Fuzzing for Testing and Securing Cyber-Physical Systems

1 code implementation28 May 2020

Cyber-physical systems (CPSs) in critical infrastructure face a pervasive threat from attackers, motivating research into a variety of countermeasures for securing them.

Active Learning