Picture for Laurie Williams

Laurie Williams

Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers

Add code
Mar 22, 2024
Viaarxiv icon

Shifting the Lens: Detecting Malware in npm Ecosystem with Large Language Models

Add code
Mar 18, 2024
Figure 1 for Shifting the Lens: Detecting Malware in npm Ecosystem with Large Language Models
Figure 2 for Shifting the Lens: Detecting Malware in npm Ecosystem with Large Language Models
Figure 3 for Shifting the Lens: Detecting Malware in npm Ecosystem with Large Language Models
Figure 4 for Shifting the Lens: Detecting Malware in npm Ecosystem with Large Language Models
Viaarxiv icon

Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports

Add code
Jan 03, 2024
Viaarxiv icon

From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts

Add code
Oct 05, 2022
Figure 1 for From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts
Figure 2 for From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts
Figure 3 for From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts
Figure 4 for From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts
Viaarxiv icon

Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue

Add code
Mar 22, 2022
Figure 1 for Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue
Figure 2 for Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue
Figure 3 for Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue
Figure 4 for Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue
Viaarxiv icon

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey

Add code
Sep 14, 2021
Figure 1 for What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey
Figure 2 for What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey
Figure 3 for What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey
Figure 4 for What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey
Viaarxiv icon

Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack

Add code
Nov 23, 2020
Figure 1 for Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack
Figure 2 for Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack
Figure 3 for Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack
Figure 4 for Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack
Viaarxiv icon