Picture for Eirini Anthi

Eirini Anthi

Gotham Dataset 2025: A Reproducible Large-Scale IoT Network Dataset for Intrusion Detection and Security Research

Add code
Feb 05, 2025
Viaarxiv icon

Using Harmonics for Low-Cost Jamming

Add code
Feb 21, 2024
Figure 1 for Using Harmonics for Low-Cost Jamming
Figure 2 for Using Harmonics for Low-Cost Jamming
Figure 3 for Using Harmonics for Low-Cost Jamming
Figure 4 for Using Harmonics for Low-Cost Jamming
Viaarxiv icon

Topic Modelling: Going Beyond Token Outputs

Add code
Jan 16, 2024
Figure 1 for Topic Modelling: Going Beyond Token Outputs
Figure 2 for Topic Modelling: Going Beyond Token Outputs
Figure 3 for Topic Modelling: Going Beyond Token Outputs
Figure 4 for Topic Modelling: Going Beyond Token Outputs
Viaarxiv icon

Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection

Add code
Oct 27, 2023
Viaarxiv icon

Federated Deep Learning for Intrusion Detection in IoT Networks

Add code
Jun 07, 2023
Figure 1 for Federated Deep Learning for Intrusion Detection in IoT Networks
Figure 2 for Federated Deep Learning for Intrusion Detection in IoT Networks
Figure 3 for Federated Deep Learning for Intrusion Detection in IoT Networks
Figure 4 for Federated Deep Learning for Intrusion Detection in IoT Networks
Viaarxiv icon

Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics

Add code
May 19, 2020
Figure 1 for Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics
Figure 2 for Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics
Figure 3 for Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics
Viaarxiv icon

Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

Add code
Apr 10, 2020
Figure 1 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Figure 2 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Figure 3 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Figure 4 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Viaarxiv icon