Alert button
Picture for Shanchieh Jay Yang

Shanchieh Jay Yang

Alert button

Advancing TTP Analysis: Harnessing the Power of Encoder-Only and Decoder-Only Language Models with Retrieval Augmented Generation

Add code
Bookmark button
Alert button
Jan 12, 2024
Reza Fayyazi, Rozhina Taghdimi, Shanchieh Jay Yang

Figure 1 for Advancing TTP Analysis: Harnessing the Power of Encoder-Only and Decoder-Only Language Models with Retrieval Augmented Generation
Figure 2 for Advancing TTP Analysis: Harnessing the Power of Encoder-Only and Decoder-Only Language Models with Retrieval Augmented Generation
Figure 3 for Advancing TTP Analysis: Harnessing the Power of Encoder-Only and Decoder-Only Language Models with Retrieval Augmented Generation
Figure 4 for Advancing TTP Analysis: Harnessing the Power of Encoder-Only and Decoder-Only Language Models with Retrieval Augmented Generation
Viaarxiv icon

Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?

Add code
Bookmark button
Alert button
Aug 28, 2023
Andrea Corsini, Shanchieh Jay Yang

Figure 1 for Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?
Figure 2 for Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?
Figure 3 for Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?
Figure 4 for Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?
Viaarxiv icon

On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions

Add code
Bookmark button
Alert button
Jun 24, 2023
Reza Fayyazi, Shanchieh Jay Yang

Figure 1 for On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions
Figure 2 for On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions
Figure 3 for On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions
Figure 4 for On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions
Viaarxiv icon

HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns

Add code
Bookmark button
Alert button
Dec 28, 2022
Stephen Moskal, Shanchieh Jay Yang

Figure 1 for HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns
Figure 2 for HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns
Figure 3 for HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns
Figure 4 for HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns
Viaarxiv icon

SAGE: Intrusion Alert-driven Attack Graph Extractor

Add code
Bookmark button
Alert button
Jul 06, 2021
Azqa Nadeem, Sicco Verwer, Stephen Moskal, Shanchieh Jay Yang

Figure 1 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Figure 2 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Figure 3 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Figure 4 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Viaarxiv icon

On the Evaluation of Sequential Machine Learning for Network Intrusion Detection

Add code
Bookmark button
Alert button
Jun 15, 2021
Andrea Corsini, Shanchieh Jay Yang, Giovanni Apruzzese

Figure 1 for On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
Figure 2 for On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
Figure 3 for On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
Figure 4 for On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
Viaarxiv icon

On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks

Add code
Bookmark button
Alert button
Aug 03, 2019
Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang

Figure 1 for On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Figure 2 for On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Figure 3 for On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Figure 4 for On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Viaarxiv icon