Picture for Stephen Moskal

Stephen Moskal

Evolving Code with A Large Language Model

Add code
Jan 13, 2024
Viaarxiv icon

LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing

Add code
Oct 10, 2023
Figure 1 for LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
Figure 2 for LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
Figure 3 for LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
Figure 4 for LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
Viaarxiv icon

HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns

Add code
Dec 28, 2022
Figure 1 for HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns
Figure 2 for HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns
Figure 3 for HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns
Figure 4 for HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns
Viaarxiv icon

SAGE: Intrusion Alert-driven Attack Graph Extractor

Add code
Jul 06, 2021
Figure 1 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Figure 2 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Figure 3 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Figure 4 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Viaarxiv icon

On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks

Add code
Aug 03, 2019
Figure 1 for On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Figure 2 for On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Figure 3 for On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Figure 4 for On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Viaarxiv icon