


default search action
CAMLIS 2023: Arlington, VA, USA
- Lauren Deason, Sagar Samtani, Edward Raff, Ethan M. Rudd:

Proceedings of the Conference on Applied Machine Learning in Information Security, Arlington, Virginia, USA, October 19-20, 2023. CEUR Workshop Proceedings 3652, CEUR-WS.org 2024 - Tamás Vörös, Sean Paul Bergeron, Konstantin Berlin:

Web Content Filtering Through Knowledge Distillation of Large Language Models. 1-21 - Alberto Acuto, Simon Maskell, Jack D.:

Defending the unknown: Exploring reinforcement learning agents' deployment in realistic, unseen networks. 22-35 - Alec Wilson, Ryan Menzies, Neela Morarji, David Foster, Marco Casassa Mont, Esin Turkbeyler, Lisa Gralewski:

Multi-Agent Reinforcement Learning for Maritime Operational Technology Cyber Security. 36-48 - Béatrice Moissinac, Elie Saad, Miranda Clay, Maialen Berrondo:

Detecting SQL Injection Attacks using Machine Learning. 49-59 - Zefang Liu, John F. Buford:

Anomaly Detection of Command Shell Sessions based on DistilBERT: Unsupervised and Supervised Approaches. 60-76 - Riddam Rishu, Akshay Kakkar, Cheng Wang, Abdul Rahman, Christopher Redino, Dhruv Nandakumar, Tyler Cody, Ryan Clark, Daniel Radke, Edward Bowen:

Enhancing Exfiltration Path Analysis Using Reinforcement Learning. 77-90 - Lewis Birch, William Hackett, Stefan Trawicki, Neeraj Suri, Peter Garraghan:

Model Leeching: An Extraction Attack Targeting LLMs. 91-104 - Robert J. Joyce, Edward Raff, Charles Nicholas, James Holt:

MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers. 105-121 - Rebecca Lynch, Lauren Saue-Fletcher:

Proxy in a Haystack: Uncovering and Classifying MFA Bypass Phishing Attacks in Large-Scale Authentication Data. 122-133 - Kate Highnam, Zach Hanif, Ellie Van Vogt, Sonali Parbhoo, Sergio Maffeis, Nicholas R. Jennings:

Adaptive Experimental Design for Intrusion Data Collection. 134-151 - Kobra Khanmohammadi, Raphaël Khoury:

Half-Day Vulnerabilities: A study of the First Days of CVE Entries. 152-180 - Tirth Patel, Fred Lu, Edward Raff, Charles Nicholas, Cynthia Matuszek, James Holt:

Small Effect Sizes in Malware Detection? Make Harder Train/Test Splits! 181-192 - Josh Collyer, Tim Watson, Iain Phillips:

FASER: Binary Code Similarity Search through the use of Intermediate Representations. 193-202

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID
















