Picture for Michael D. Iannacone

Michael D. Iannacone

Oak Ridge National Laboratory

Detecting CAN Masquerade Attacks with Signal Clustering Similarity

Add code
Jan 07, 2022
Figure 1 for Detecting CAN Masquerade Attacks with Signal Clustering Similarity
Figure 2 for Detecting CAN Masquerade Attacks with Signal Clustering Similarity
Figure 3 for Detecting CAN Masquerade Attacks with Signal Clustering Similarity
Figure 4 for Detecting CAN Masquerade Attacks with Signal Clustering Similarity
Viaarxiv icon

Time-Based CAN Intrusion Detection Benchmark

Add code
Jan 14, 2021
Figure 1 for Time-Based CAN Intrusion Detection Benchmark
Figure 2 for Time-Based CAN Intrusion Detection Benchmark
Figure 3 for Time-Based CAN Intrusion Detection Benchmark
Viaarxiv icon

ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide)

Add code
Dec 29, 2020
Figure 1 for ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide)
Figure 2 for ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide)
Figure 3 for ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide)
Figure 4 for ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide)
Viaarxiv icon

Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection

Add code
Dec 16, 2020
Figure 1 for Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection
Figure 2 for Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection
Figure 3 for Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection
Figure 4 for Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection
Viaarxiv icon

GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection

Add code
Feb 02, 2016
Figure 1 for GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection
Figure 2 for GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection
Figure 3 for GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection
Viaarxiv icon

Automatic Labeling for Entity Extraction in Cyber Security

Add code
Jun 09, 2014
Figure 1 for Automatic Labeling for Entity Extraction in Cyber Security
Figure 2 for Automatic Labeling for Entity Extraction in Cyber Security
Figure 3 for Automatic Labeling for Entity Extraction in Cyber Security
Figure 4 for Automatic Labeling for Entity Extraction in Cyber Security
Viaarxiv icon

PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts

Add code
Oct 11, 2013
Figure 1 for PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts
Figure 2 for PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts
Figure 3 for PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts
Figure 4 for PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts
Viaarxiv icon