Alert button
Picture for Spiros Mancoridis

Spiros Mancoridis

Alert button

Simulation of Attacker Defender Interaction in a Noisy Security Game

Add code
Bookmark button
Alert button
Dec 08, 2022
Erick Galinkin, Emmanouil Pountourakis, John Carter, Spiros Mancoridis

Figure 1 for Simulation of Attacker Defender Interaction in a Noisy Security Game
Figure 2 for Simulation of Attacker Defender Interaction in a Noisy Security Game
Figure 3 for Simulation of Attacker Defender Interaction in a Noisy Security Game
Viaarxiv icon

Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem

Add code
Bookmark button
Alert button
Oct 29, 2021
John Carter, Spiros Mancoridis

Figure 1 for Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem
Figure 2 for Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem
Figure 3 for Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem
Figure 4 for Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem
Viaarxiv icon

Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem

Add code
Bookmark button
Alert button
Sep 23, 2021
Erick Galinkin, John Carter, Spiros Mancoridis

Figure 1 for Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem
Figure 2 for Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem
Figure 3 for Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem
Figure 4 for Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem
Viaarxiv icon

Behavioral Malware Classification using Convolutional Recurrent Neural Networks

Add code
Bookmark button
Alert button
Nov 19, 2018
Bander Alsulami, Spiros Mancoridis

Figure 1 for Behavioral Malware Classification using Convolutional Recurrent Neural Networks
Figure 2 for Behavioral Malware Classification using Convolutional Recurrent Neural Networks
Figure 3 for Behavioral Malware Classification using Convolutional Recurrent Neural Networks
Figure 4 for Behavioral Malware Classification using Convolutional Recurrent Neural Networks
Viaarxiv icon