Picture for Pete Burnap

Pete Burnap

Topic Modelling: Going Beyond Token Outputs

Add code
Jan 16, 2024
Figure 1 for Topic Modelling: Going Beyond Token Outputs
Figure 2 for Topic Modelling: Going Beyond Token Outputs
Figure 3 for Topic Modelling: Going Beyond Token Outputs
Figure 4 for Topic Modelling: Going Beyond Token Outputs
Viaarxiv icon

Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection

Add code
Oct 27, 2023
Viaarxiv icon

Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics

Add code
May 19, 2020
Figure 1 for Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics
Figure 2 for Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics
Figure 3 for Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics
Viaarxiv icon

Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

Add code
Apr 10, 2020
Figure 1 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Figure 2 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Figure 3 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Figure 4 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Viaarxiv icon

The Enemy Among Us: Detecting Hate Speech with Threats Based 'Othering' Language Embeddings

Add code
Mar 08, 2018
Figure 1 for The Enemy Among Us: Detecting Hate Speech with Threats Based 'Othering' Language Embeddings
Figure 2 for The Enemy Among Us: Detecting Hate Speech with Threats Based 'Othering' Language Embeddings
Figure 3 for The Enemy Among Us: Detecting Hate Speech with Threats Based 'Othering' Language Embeddings
Figure 4 for The Enemy Among Us: Detecting Hate Speech with Threats Based 'Othering' Language Embeddings
Viaarxiv icon