Picture for Shanchieh Jay Yang

Shanchieh Jay Yang

ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs

Add code
Oct 22, 2024
Figure 1 for ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs
Figure 2 for ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs
Figure 3 for ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs
Figure 4 for ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs
Viaarxiv icon

Advancing TTP Analysis: Harnessing the Power of Encoder-Only and Decoder-Only Language Models with Retrieval Augmented Generation

Add code
Jan 12, 2024
Viaarxiv icon

Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?

Add code
Aug 28, 2023
Viaarxiv icon

On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions

Add code
Jun 24, 2023
Viaarxiv icon

HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns

Add code
Dec 28, 2022
Figure 1 for HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns
Figure 2 for HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns
Figure 3 for HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns
Figure 4 for HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns
Viaarxiv icon

SAGE: Intrusion Alert-driven Attack Graph Extractor

Add code
Jul 06, 2021
Figure 1 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Figure 2 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Figure 3 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Figure 4 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Viaarxiv icon

On the Evaluation of Sequential Machine Learning for Network Intrusion Detection

Add code
Jun 15, 2021
Figure 1 for On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
Figure 2 for On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
Figure 3 for On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
Figure 4 for On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
Viaarxiv icon

On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks

Add code
Aug 03, 2019
Figure 1 for On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Figure 2 for On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Figure 3 for On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Figure 4 for On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Viaarxiv icon