Search

Your search keyword '"Harang, Richard"' showing total 108 results

Search Constraints

Start Over You searched for: Author "Harang, Richard" Remove constraint Author: "Harang, Richard"
108 results on '"Harang, Richard"'

Search Results

1. SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection

2. CATBERT: Context-Aware Tiny BERT for Detecting Social Engineering Emails

3. ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation

4. Statistical Models for the Number of Successful Cyber Intrusions

5. Towards Principled Uncertainty Estimation for Deep Neural Networks

6. MEADE: Towards a Malicious Email Attachment Detection Engine

7. A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content

8. Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach

9. Identifying Key Cyber-Physical Terrain (Extended Version)

10. Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments

11. Crafting Adversarial Input Sequences for Recurrent Neural Networks

12. When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

13. SeqDroid: Obfuscated Android Malware Detection Using Stacked Convolutional and Recurrent Neural Networks

14. Source Code Authorship Attribution Using Long Short-Term Memory Based Networks

15. Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection

16. WAVOS: a MATLAB toolkit for wavelet analysis and visualization of oscillatory systems

18. Defensive Resource Allocations with Security Chokepoints in IPv6 Networks

19. Learning and Semantics

30. Git blame who?

44. Statistical models for the number of successful cyber intrusions.

47. Compilation of a Network Security/Machine Learning Toolchain for Android ARM Platforms

Catalog

Books, media, physical & digital resources