Zum Hauptinhalt springen

Showing 1–3 of 3 results for author: Fayyazi, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.05494  [pdf, other

    cs.LG cs.NE

    Prospective Messaging: Learning in Networks with Communication Delays

    Authors: Ryan Fayyazi, Christian Weilbach, Frank Wood

    Abstract: Inter-neuron communication delays are ubiquitous in physically realized neural networks such as biological neural circuits and neuromorphic hardware. These delays have significant and often disruptive consequences on network dynamics during training and inference. It is therefore essential that communication delays be accounted for, both in computational models of biological neural networks and in… ▽ More

    Submitted 8 July, 2024; v1 submitted 7 July, 2024; originally announced July 2024.

  2. arXiv:2401.00280  [pdf, other

    cs.CR cs.LG

    Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation

    Authors: Reza Fayyazi, Rozhina Taghdimi, Shanchieh Jay Yang

    Abstract: Tactics, Techniques, and Procedures (TTPs) outline the methods attackers use to exploit vulnerabilities. The interpretation of TTPs in the MITRE ATT&CK framework can be challenging for cybersecurity practitioners due to presumed expertise and complex dependencies. Meanwhile, advancements with Large Language Models (LLMs) have led to recent surge in studies exploring its uses in cybersecurity opera… ▽ More

    Submitted 21 July, 2024; v1 submitted 30 December, 2023; originally announced January 2024.

  3. arXiv:2306.14062  [pdf, other

    cs.AI cs.CR

    On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions

    Authors: Reza Fayyazi, Shanchieh Jay Yang

    Abstract: The volume, variety, and velocity of change in vulnerabilities and exploits have made incident threat analysis challenging with human expertise and experience along. Tactics, Techniques, and Procedures (TTPs) are to describe how and why attackers exploit vulnerabilities. However, a TTP description written by one security professional can be interpreted very differently by another, leading to confu… ▽ More

    Submitted 22 August, 2023; v1 submitted 24 June, 2023; originally announced June 2023.