Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–8 of 8 results for author: Timmer, C

.
  1. arXiv:2405.04758  [pdf, other

    cs.CR cs.AI cs.CL

    Honeyfile Camouflage: Hiding Fake Files in Plain Sight

    Authors: Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere

    Abstract: Honeyfiles are a particularly useful type of honeypot: fake files deployed to detect and infer information from malicious behaviour. This paper considers the challenge of naming honeyfiles so they are camouflaged when placed amongst real files in a file system. Based on cosine distances in semantic vector spaces, we develop two metrics for filename camouflage: one based on simple averaging and one… ▽ More

    Submitted 10 May, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

    Comments: 3rd Workshop on the security implications of Deepfakes and Cheapfakes (WDC) co-located at ACM ASIACCS 2024

  2. arXiv:2303.10871  [pdf, other

    cs.IR cs.AI

    NASA Science Mission Directorate Knowledge Graph Discovery

    Authors: Roelien C. Timmer, Fech Scen Khoo, Megan Mark, Marcella Scoczynski Ribeiro Martins, Anamaria Berea, Gregory Renard, Kaylin Bugbee

    Abstract: The size of the National Aeronautics and Space Administration (NASA) Science Mission Directorate (SMD) is growing exponentially, allowing researchers to make discoveries. However, making discoveries is challenging and time-consuming due to the size of the data catalogs, and as many concepts and data are indirectly connected. This paper proposes a pipeline to generate knowledge graphs (KGs) represe… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

  3. Deception for Cyber Defence: Challenges and Opportunities

    Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar

    Abstract: Deception is rapidly growing as an important tool for cyber defence, complementing existing perimeter security measures to rapidly detect breaches and data theft. One of the factors limiting the use of deception has been the cost of generating realistic artefacts by hand. Recent advances in Machine Learning have, however, created opportunities for scalable, automated generation of realistic decept… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Journal ref: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2021, pp. 173-182

  4. arXiv:2203.07580  [pdf, other

    cs.CL cs.CR cs.LG

    TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing

    Authors: Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil Kanhere

    Abstract: Honeyfile deployment is a useful breach detection method in cyber deception that can also inform defenders about the intent and interests of intruders and malicious insiders. A key property of a honeyfile, enticement, is the extent to which the file can attract an intruder to interact with it. We introduce a novel metric, Topic Semantic Matching (TSM), which uses topic modelling to represent files… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  5. arXiv:2203.06793  [pdf, other

    cs.CL

    Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study

    Authors: Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere

    Abstract: Each and every organisation releases information in a variety of forms ranging from annual reports to legal proceedings. Such documents may contain sensitive information and releasing them openly may lead to the leakage of confidential information. Detection of sentences that contain sensitive information in documents can help organisations prevent the leakage of valuable confidential information.… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

  6. arXiv:2202.03085  [pdf, other

    physics.ins-det nucl-ex

    Streaming readout for next generation electron scattering experiment

    Authors: Fabrizio Ameli, Marco Battaglieri, Vladimir V. Berdnikov, Mariangela Bondì, Sergey Boyarinov, Nathan Brei, Laura Cappelli, Andrea Celentano, Tommaso Chiarusi, Raffaella De Vita, Cristiano Fanelli, Vardan Gyurjyan, David Lawrence, Patrick Moran, Paolo Musico, Carmelo Pellegrino, Alessandro Pilloni, Ben Raydo, Carl Timmer, Maurizio Ungaro, Simone Vallarino

    Abstract: Current and future experiments at the high intensity frontier are expected to produce an enormous amount of data that needs to be collected and stored for offline analysis. Thanks to the continuous progress in computing and networking technology, it is now possible to replace the standard `triggered' data acquisition systems with a new, simplified and outperforming scheme. `Streaming readout' (SRO… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

  7. arXiv:2011.01345  [pdf

    physics.ins-det

    SAMPA Based Streaming Readout Data Acquisition Prototype

    Authors: E. Jastrzembski, D. Abbott, J. Gu, V. Gyurjyan, G. Heyes, B. Moffit, E. Pooser, C. Timmer, A. Hellman

    Abstract: We have assembled a small-scale streaming data acquisition system based on the SAMPA front-end ASIC. We report on measurements performed on the SAMPA chip and preliminary cosmic ray data acquired from a Gas Electron Multiplier (GEM) detector read out using the SAMPA.

    Submitted 2 November, 2020; originally announced November 2020.

    Comments: Submitted to the 22nd Virtual IEEE Real Time Conference, 12-23 October 2020

  8. arXiv:hep-ex/0305016  [pdf, ps

    hep-ex

    FIPA agent based network distributed control system

    Authors: V. Gyurjyan, D. Abbott, G. Heyes, E. Jastrzembski, C. Timmer, E. Wolin

    Abstract: A control system with the capabilities to combine heteregeneous control systems or processes into a uniform homogeneous environment is discussed. This dynamically extensible system is an example of the software system at the agent level of abstraction. This level of abstraction considers agents as atomic entities that communicate to implement the functionality of the control system. Agents engin… ▽ More

    Submitted 12 May, 2003; originally announced May 2003.

    Comments: Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 5 pages, PS format. PSN THGT009

    Journal ref: ECONF C0303241:THGT009,2003