Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 An Efficient One-Class SVM for Novelty Detection in IoT Read More Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 CYsyphus – The Cyber Security Policy Recommendation Tool Read More Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 Gefilte Phish: Stopping PII Phishing Campaigns with Believable Decoy Read More Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 Attacker-Defender Investment Strategies in Cybersecurity Read More Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 Towards Finer-Grained Access Control for Globally Accessible IoT Read More Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 Learning Nonlinear Loop Invariants with Gated Continuous Logic Networks Read More Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 The News Authentication Project – Cryptographic Provenance for Digital Publishing Read More Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 Detecting Sensor-Based Repackaged Malware Read More
Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 An Efficient One-Class SVM for Novelty Detection in IoT Read More
Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 CYsyphus – The Cyber Security Policy Recommendation Tool Read More
Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 Gefilte Phish: Stopping PII Phishing Campaigns with Believable Decoy Read More
Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 Attacker-Defender Investment Strategies in Cybersecurity Read More
Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 Towards Finer-Grained Access Control for Globally Accessible IoT Read More
Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 Learning Nonlinear Loop Invariants with Gated Continuous Logic Networks Read More
Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 The News Authentication Project – Cryptographic Provenance for Digital Publishing Read More
Cybersecurity Alexis Avedisian 2/18/21 Cybersecurity Alexis Avedisian 2/18/21 Detecting Sensor-Based Repackaged Malware Read More