Picture for Vrizlynn L. L. Thing

Vrizlynn L. L. Thing

CPE-Identifier: Automated CPE identification and CVE summaries annotation with Deep Learning and NLP

Add code
May 22, 2024
Figure 1 for CPE-Identifier: Automated CPE identification and CVE summaries annotation with Deep Learning and NLP
Figure 2 for CPE-Identifier: Automated CPE identification and CVE summaries annotation with Deep Learning and NLP
Figure 3 for CPE-Identifier: Automated CPE identification and CVE summaries annotation with Deep Learning and NLP
Figure 4 for CPE-Identifier: Automated CPE identification and CVE summaries annotation with Deep Learning and NLP
Viaarxiv icon

Privacy-Preserving Intrusion Detection using Convolutional Neural Networks

Add code
Apr 15, 2024
Figure 1 for Privacy-Preserving Intrusion Detection using Convolutional Neural Networks
Figure 2 for Privacy-Preserving Intrusion Detection using Convolutional Neural Networks
Figure 3 for Privacy-Preserving Intrusion Detection using Convolutional Neural Networks
Figure 4 for Privacy-Preserving Intrusion Detection using Convolutional Neural Networks
Viaarxiv icon

An adversarial attack approach for eXplainable AI evaluation on deepfake detection models

Add code
Dec 08, 2023
Viaarxiv icon

Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees

Add code
May 15, 2023
Figure 1 for Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees
Figure 2 for Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees
Figure 3 for Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees
Figure 4 for Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees
Viaarxiv icon

Few-shot Weakly-supervised Cybersecurity Anomaly Detection

Add code
Apr 15, 2023
Figure 1 for Few-shot Weakly-supervised Cybersecurity Anomaly Detection
Figure 2 for Few-shot Weakly-supervised Cybersecurity Anomaly Detection
Figure 3 for Few-shot Weakly-supervised Cybersecurity Anomaly Detection
Figure 4 for Few-shot Weakly-supervised Cybersecurity Anomaly Detection
Viaarxiv icon

Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers

Add code
Apr 07, 2023
Figure 1 for Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers
Figure 2 for Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers
Figure 3 for Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers
Figure 4 for Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers
Viaarxiv icon

Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms

Add code
Apr 07, 2023
Figure 1 for Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms
Figure 2 for Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms
Figure 3 for Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms
Figure 4 for Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms
Viaarxiv icon

A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection

Add code
Dec 02, 2022
Figure 1 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Figure 2 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Figure 3 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Figure 4 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Viaarxiv icon

Intrusion Detection in Internet of Things using Convolutional Neural Networks

Add code
Nov 18, 2022
Figure 1 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Figure 2 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Figure 3 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Figure 4 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Viaarxiv icon

Clustering based opcode graph generation for malware variant detection

Add code
Nov 18, 2022
Viaarxiv icon