Picture for Eirini Anthi

Eirini Anthi

Using Harmonics for Low-Cost Jamming

Add code
Feb 21, 2024
Viaarxiv icon

Topic Modelling: Going Beyond Token Outputs

Add code
Jan 16, 2024
Figure 1 for Topic Modelling: Going Beyond Token Outputs
Figure 2 for Topic Modelling: Going Beyond Token Outputs
Figure 3 for Topic Modelling: Going Beyond Token Outputs
Figure 4 for Topic Modelling: Going Beyond Token Outputs
Viaarxiv icon

Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection

Add code
Oct 27, 2023
Viaarxiv icon

Federated Deep Learning for Intrusion Detection in IoT Networks

Add code
Jun 07, 2023
Viaarxiv icon

Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics

Add code
May 19, 2020
Figure 1 for Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics
Figure 2 for Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics
Figure 3 for Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics
Viaarxiv icon

Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

Add code
Apr 10, 2020
Figure 1 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Figure 2 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Figure 3 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Figure 4 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Viaarxiv icon