no code implementations • 13 Jan 2024 • Erik Hemberg, Stephen Moskal, Una-May O'Reilly
Algorithms that use Large Language Models (LLMs) to evolve code arrived on the Genetic Programming (GP) scene very recently.
no code implementations • 10 Oct 2023 • Stephen Moskal, Sam Laney, Erik Hemberg, Una-May O'Reilly
We present prompt engineering approaches for a plan-act-report loop for one action of a threat campaign and and a prompt chaining design that directs the sequential decision process of a multi-action campaign.
no code implementations • 28 Dec 2022 • Stephen Moskal, Shanchieh Jay Yang
With growing sophistication and volume of cyber attacks combined with complex network structures, it is becoming extremely difficult for security analysts to corroborate evidences to identify multistage campaigns on their network.
no code implementations • 3 Aug 2019 • Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang
Recreating cyber-attack alert data with a high level of fidelity is challenging due to the intricate interaction between features, non-homogeneity of alerts, and potential for rare yet critical samples.