Alert button
Picture for Nicole Nichols

Nicole Nichols

Alert button

Pacific Northwest National Laboratory

Beyond CAGE: Investigating Generalization of Learned Autonomous Network Defense Policies

Add code
Bookmark button
Alert button
Nov 30, 2022
Melody Wolk, Andy Applebaum, Camron Dennler, Patrick Dwyer, Marina Moskowitz, Harold Nguyen, Nicole Nichols, Nicole Park, Paul Rachwalski, Frank Rau, Adrian Webster

Figure 1 for Beyond CAGE: Investigating Generalization of Learned Autonomous Network Defense Policies
Figure 2 for Beyond CAGE: Investigating Generalization of Learned Autonomous Network Defense Policies
Figure 3 for Beyond CAGE: Investigating Generalization of Learned Autonomous Network Defense Policies
Figure 4 for Beyond CAGE: Investigating Generalization of Learned Autonomous Network Defense Policies
Viaarxiv icon

Machine Learning Algorithms for Active Monitoring of High Performance Computing as a Service (HPCaaS) Cloud Environments

Add code
Bookmark button
Alert button
Sep 26, 2020
Gianluca Longoni, Ryan LaMothe, Jeremy Teuton, Mark Greaves, Nicole Nichols, William Smith

Figure 1 for Machine Learning Algorithms for Active Monitoring of High Performance Computing as a Service (HPCaaS) Cloud Environments
Figure 2 for Machine Learning Algorithms for Active Monitoring of High Performance Computing as a Service (HPCaaS) Cloud Environments
Figure 3 for Machine Learning Algorithms for Active Monitoring of High Performance Computing as a Service (HPCaaS) Cloud Environments
Figure 4 for Machine Learning Algorithms for Active Monitoring of High Performance Computing as a Service (HPCaaS) Cloud Environments
Viaarxiv icon

Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers

Add code
Bookmark button
Alert button
Apr 24, 2020
Loc Truong, Chace Jones, Brian Hutchinson, Andrew August, Brenda Praggastis, Robert Jasper, Nicole Nichols, Aaron Tuor

Figure 1 for Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Figure 2 for Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Figure 3 for Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Figure 4 for Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Viaarxiv icon

Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers

Add code
Bookmark button
Alert button
Oct 16, 2018
Nicole Nichols, Robert Jasper

Figure 1 for Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers
Figure 2 for Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers
Figure 3 for Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers
Figure 4 for Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers
Viaarxiv icon

Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection

Add code
Bookmark button
Alert button
Mar 13, 2018
Andy Brown, Aaron Tuor, Brian Hutchinson, Nicole Nichols

Figure 1 for Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
Figure 2 for Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
Figure 3 for Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
Figure 4 for Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
Viaarxiv icon

Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams

Add code
Bookmark button
Alert button
Dec 15, 2017
Aaron Tuor, Samuel Kaplan, Brian Hutchinson, Nicole Nichols, Sean Robinson

Figure 1 for Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams
Figure 2 for Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams
Figure 3 for Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams
Figure 4 for Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams
Viaarxiv icon

Recurrent Neural Network Language Models for Open Vocabulary Event-Level Cyber Anomaly Detection

Add code
Bookmark button
Alert button
Dec 02, 2017
Aaron Tuor, Ryan Baerwolf, Nicolas Knowles, Brian Hutchinson, Nicole Nichols, Rob Jasper

Figure 1 for Recurrent Neural Network Language Models for Open Vocabulary Event-Level Cyber Anomaly Detection
Figure 2 for Recurrent Neural Network Language Models for Open Vocabulary Event-Level Cyber Anomaly Detection
Figure 3 for Recurrent Neural Network Language Models for Open Vocabulary Event-Level Cyber Anomaly Detection
Figure 4 for Recurrent Neural Network Language Models for Open Vocabulary Event-Level Cyber Anomaly Detection
Viaarxiv icon

Faster Fuzzing: Reinitialization with Deep Neural Models

Add code
Bookmark button
Alert button
Nov 08, 2017
Nicole Nichols, Mark Raugas, Robert Jasper, Nathan Hilliard

Figure 1 for Faster Fuzzing: Reinitialization with Deep Neural Models
Figure 2 for Faster Fuzzing: Reinitialization with Deep Neural Models
Figure 3 for Faster Fuzzing: Reinitialization with Deep Neural Models
Viaarxiv icon