no code implementations • 13 Apr 2023 • Ashraf Haddad, Najwa Aaraj, Preslav Nakov, Septimiu Fabian Mare
In recent years, a proliferation of cyber-security threats and diversity has been on the rise culminating in an increase in their reporting and analysis.
no code implementations • 7 Aug 2021 • Tanujay Saha, Najwa Aaraj, Niraj K. Jha
The core network architecture of telecommunication systems has undergone a paradigm shift in the fifth-generation (5G)networks.
no code implementations • 7 Jan 2021 • Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha
The novelty of this approach lies in extracting intelligence from known real-world CPS/IoT attacks, representing them in the form of regular expressions, and employing machine learning (ML) techniques on this ensemble of regular expressions to generate new attack vectors and security vulnerabilities.