Alert button
Picture for William Briguglio

William Briguglio

Alert button

UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring

Nov 19, 2021
Waleed A. Yousef, Issa Traore, William Briguglio

Figure 1 for UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring
Figure 2 for UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring
Figure 3 for UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring
Figure 4 for UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring
Viaarxiv icon

Classifier Calibration: with implications to threat scores in cybersecurity

Feb 09, 2021
Waleed A. Yousef, Issa Traore, William Briguglio

Figure 1 for Classifier Calibration: with implications to threat scores in cybersecurity
Figure 2 for Classifier Calibration: with implications to threat scores in cybersecurity
Figure 3 for Classifier Calibration: with implications to threat scores in cybersecurity
Figure 4 for Classifier Calibration: with implications to threat scores in cybersecurity
Viaarxiv icon

Machine Learning in Precision Medicine to Preserve Privacy via Encryption

Feb 05, 2021
William Briguglio, Parisa Moghaddam, Waleed A. Yousef, Issa Traore, Mohammad Mamun

Figure 1 for Machine Learning in Precision Medicine to Preserve Privacy via Encryption
Figure 2 for Machine Learning in Precision Medicine to Preserve Privacy via Encryption
Figure 3 for Machine Learning in Precision Medicine to Preserve Privacy via Encryption
Figure 4 for Machine Learning in Precision Medicine to Preserve Privacy via Encryption
Viaarxiv icon

Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis

Jan 27, 2020
William Briguglio, Sherif Saad

Figure 1 for Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis
Figure 2 for Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis
Figure 3 for Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis
Figure 4 for Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis
Viaarxiv icon

The Curious Case of Machine Learning In Malware Detection

May 18, 2019
Sherif Saad, William Briguglio, Haytham Elmiligi

Viaarxiv icon