Alert button
Picture for Sean Oesch

Sean Oesch

Alert button

The Path To Autonomous Cyber Defense

Add code
Bookmark button
Alert button
Apr 12, 2024
Sean Oesch, Phillipe Austria, Amul Chaulagain, Brian Weber, Cory Watson, Matthew Dixson, Amir Sadovnik

Viaarxiv icon

Toward the Detection of Polyglot Files

Add code
Bookmark button
Alert button
Apr 13, 2022
Luke Koch, Sean Oesch, Mary Adkisson, Sam Erwin, Brian Weber, Amul Chaulagain

Figure 1 for Toward the Detection of Polyglot Files
Figure 2 for Toward the Detection of Polyglot Files
Figure 3 for Toward the Detection of Polyglot Files
Figure 4 for Toward the Detection of Polyglot Files
Viaarxiv icon

Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection

Add code
Bookmark button
Alert button
Dec 16, 2020
Robert A. Bridges, Sean Oesch, Miki E. Verma, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Justin M. Beaver, Jared M. Smith, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall

Figure 1 for Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection
Figure 2 for Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection
Figure 3 for Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection
Figure 4 for Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection
Viaarxiv icon

An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center

Add code
Bookmark button
Alert button
Dec 16, 2020
Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles, Dan Scofield

Figure 1 for An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Figure 2 for An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Figure 3 for An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Figure 4 for An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Viaarxiv icon