Alert button
Picture for Pete Burnap

Pete Burnap

Alert button

Topic Modelling: Going Beyond Token Outputs

Add code
Bookmark button
Alert button
Jan 16, 2024
Lowri Williams, Eirini Anthi, Laura Arman, Pete Burnap

Viaarxiv icon

Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection

Add code
Bookmark button
Alert button
Oct 27, 2023
Baskoro Adi Pratomo, Toby Jackson, Pete Burnap, Andrew Hood, Eirini Anthi

Viaarxiv icon

Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics

Add code
Bookmark button
Alert button
May 19, 2020
Petar Radanliev, David De Roure, Kevin Page, Max Van Kleek, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Stacy Cannady, Pete Burnap, Eirini Anthi, Carsten Maple

Figure 1 for Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics
Figure 2 for Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics
Figure 3 for Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics
Viaarxiv icon

Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

Add code
Bookmark button
Alert button
Apr 10, 2020
Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury

Figure 1 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Figure 2 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Figure 3 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Figure 4 for Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Viaarxiv icon

The Enemy Among Us: Detecting Hate Speech with Threats Based 'Othering' Language Embeddings

Add code
Bookmark button
Alert button
Mar 08, 2018
Wafa Alorainy, Pete Burnap, Han Liu, Matthew Williams

Figure 1 for The Enemy Among Us: Detecting Hate Speech with Threats Based 'Othering' Language Embeddings
Figure 2 for The Enemy Among Us: Detecting Hate Speech with Threats Based 'Othering' Language Embeddings
Figure 3 for The Enemy Among Us: Detecting Hate Speech with Threats Based 'Othering' Language Embeddings
Figure 4 for The Enemy Among Us: Detecting Hate Speech with Threats Based 'Othering' Language Embeddings
Viaarxiv icon