


default search action
CAMLIS 2023: Arlington, VA, USA
- Lauren Deason, Sagar Samtani, Edward Raff, Ethan M. Rudd:
Proceedings of the Conference on Applied Machine Learning in Information Security, Arlington, Virginia, USA, October 19-20, 2023. CEUR Workshop Proceedings 3652, CEUR-WS.org 2024 - Tamás Vörös, Sean Paul Bergeron, Konstantin Berlin:
Web Content Filtering Through Knowledge Distillation of Large Language Models. 1-21 - Alberto Acuto, Simon Maskell, Jack D.:
Defending the unknown: Exploring reinforcement learning agents' deployment in realistic, unseen networks. 22-35 - Alec Wilson, Ryan Menzies, Neela Morarji, David Foster, Marco Casassa Mont, Esin Turkbeyler, Lisa Gralewski:
Multi-Agent Reinforcement Learning for Maritime Operational Technology Cyber Security. 36-48 - Béatrice Moissinac, Elie Saad, Miranda Clay, Maialen Berrondo:
Detecting SQL Injection Attacks using Machine Learning. 49-59 - Zefang Liu, John F. Buford:
Anomaly Detection of Command Shell Sessions based on DistilBERT: Unsupervised and Supervised Approaches. 60-76 - Riddam Rishu, Akshay Kakkar, Cheng Wang, Abdul Rahman, Christopher Redino, Dhruv Nandakumar, Tyler Cody, Ryan Clark, Daniel Radke, Edward Bowen:
Enhancing Exfiltration Path Analysis Using Reinforcement Learning. 77-90 - Lewis Birch, William Hackett, Stefan Trawicki, Neeraj Suri, Peter Garraghan:
Model Leeching: An Extraction Attack Targeting LLMs. 91-104 - Robert J. Joyce, Edward Raff, Charles Nicholas, James Holt:
MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers. 105-121 - Rebecca Lynch, Lauren Saue-Fletcher:
Proxy in a Haystack: Uncovering and Classifying MFA Bypass Phishing Attacks in Large-Scale Authentication Data. 122-133 - Kate Highnam, Zach Hanif, Ellie Van Vogt, Sonali Parbhoo, Sergio Maffeis, Nicholas R. Jennings:
Adaptive Experimental Design for Intrusion Data Collection. 134-151 - Kobra Khanmohammadi, Raphaël Khoury:
Half-Day Vulnerabilities: A study of the First Days of CVE Entries. 152-180 - Tirth Patel, Fred Lu, Edward Raff, Charles Nicholas, Cynthia Matuszek, James Holt:
Small Effect Sizes in Malware Detection? Make Harder Train/Test Splits! 181-192 - Josh Collyer, Tim Watson, Iain Phillips:
FASER: Binary Code Similarity Search through the use of Intermediate Representations. 193-202

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.