Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Pittman, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.14975  [pdf, other

    cs.AI cs.CY

    A Measure for Level of Autonomy Based on Observable System Behavior

    Authors: Jason M. Pittman

    Abstract: Contemporary artificial intelligence systems are pivotal in enhancing human efficiency and safety across various domains. One such domain is autonomous systems, especially in automotive and defense use cases. Artificial intelligence brings learning and enhanced decision-making to autonomy system goal-oriented behaviors and human independence. However, the lack of clear understanding of autonomy sy… ▽ More

    Submitted 20 July, 2024; originally announced July 2024.

    Comments: 9 pages, 1 figure, 3 tables

  2. The illusion of artificial inclusion

    Authors: William Agnew, A. Stevie Bergman, Jennifer Chien, Mark Díaz, Seliem El-Sayed, Jaylen Pittman, Shakir Mohamed, Kevin R. McKee

    Abstract: Human participants play a central role in the development of modern artificial intelligence (AI) technology, in psychological science, and in user research. Recent advances in generative AI have attracted growing interest to the possibility of replacing human participants in these domains with AI surrogates. We survey several such "substitution proposals" to better understand the arguments for and… ▽ More

    Submitted 5 February, 2024; v1 submitted 16 January, 2024; originally announced January 2024.

    Comments: Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI 2024)

  3. arXiv:2307.11038  [pdf, other

    cs.CR

    To What Extent Are Honeypots and Honeynets Autonomic Computing Systems?

    Authors: Jason M. Pittman, Shaho Alaee

    Abstract: Cyber threats, such as advanced persistent threats (APTs), ransomware, and zero-day exploits, are rapidly evolving and demand improved security measures. Honeypots and honeynets, as deceptive systems, offer valuable insights into attacker behavior, helping researchers and practitioners develop innovative defense strategies and enhance detection mechanisms. However, their deployment involves signif… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: 18 pages, 3 figures, 5 tables

  4. arXiv:2303.11282  [pdf, other

    cs.CR

    A Comparative Analysis of Port Scanning Tool Efficacy

    Authors: Jason M. Pittman

    Abstract: Port scanning refers to the systematic exploration of networked computing systems. The goal of port scanning is to identify active services and associated information. Although this technique is often employed by malicious actors to locate vulnerable systems within a network, port scanning is also a legitimate method employed by IT professionals to troubleshoot network issues and maintain system s… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Comments: 7 pages, 2 figures, 3 tables

  5. arXiv:2302.09317  [pdf, ps, other

    cs.CR cs.LG

    Reproducing Random Forest Efficacy in Detecting Port Scanning

    Authors: Jason M. Pittman

    Abstract: Port scanning is the process of attempting to connect to various network ports on a computing endpoint to determine which ports are open and which services are running on them. It is a common method used by hackers to identify vulnerabilities in a network or system. By determining which ports are open, an attacker can identify which services and applications are running on a device and potentially… ▽ More

    Submitted 18 February, 2023; originally announced February 2023.

    Comments: 7 tables

  6. arXiv:2301.13581  [pdf, ps, other

    cs.CR

    Machine Learning and Port Scans: A Systematic Review

    Authors: Jason M. Pittman

    Abstract: Port scanning is the process of attempting to connect to various network ports on a computing endpoint to determine which ports are open and which services are running on them. It is a common method used by hackers to identify vulnerabilities in a network or system. By determining which ports are open, an attacker can identify which services and applications are running on a device and potentially… ▽ More

    Submitted 31 January, 2023; originally announced January 2023.

    Comments: 8 pages, 7 tables

  7. arXiv:2209.14958  [pdf, other

    cs.HC cs.CL

    Co-Writing Screenplays and Theatre Scripts with Language Models: An Evaluation by Industry Professionals

    Authors: Piotr Mirowski, Kory W. Mathewson, Jaylen Pittman, Richard Evans

    Abstract: Language models are increasingly attracting interest from writers. However, such models lack long-range semantic coherence, limiting their usefulness for longform creative writing. We address this limitation by applying language models hierarchically, in a system we call Dramatron. By building structural context via prompt chaining, Dramatron can generate coherent scripts and screenplays complete… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

    Comments: 102 pages, 7 figures

  8. arXiv:2011.05807  [pdf

    cs.CY cs.AI

    Detecting Synthetic Phenomenology in a Contained Artificial General Intelligence

    Authors: Jason M. Pittman, Ashlyn Hanks

    Abstract: Human-like intelligence in a machine is a contentious subject. Whether mankind should or should not pursue the creation of artificial general intelligence is hotly debated. As well, researchers have aligned in opposing factions according to whether mankind can create it. For our purposes, we assume mankind can and will do so. Thus, it becomes necessary to contemplate how to do so in a safe and tru… ▽ More

    Submitted 6 November, 2020; originally announced November 2020.

    Comments: 6 pages

  9. arXiv:2011.00582  [pdf

    cs.CR

    Primer -- A Tool for Testing Honeypot Measures of Effectiveness

    Authors: Jason M. Pittman, Kyle Hoffpauir, Nathan Markle

    Abstract: Honeypots are a deceptive technology used to capture malicious activity. The technology is useful for studying attacker behavior, tools, and techniques but can be difficult to implement and maintain. Historically, a lack of measures of effectiveness prevented researchers from assessing honeypot implementations. The consequence being ineffective implementations leading to poor performance, flawed i… ▽ More

    Submitted 1 November, 2020; originally announced November 2020.

    Comments: 4 pages, 4 figures

  10. arXiv:2005.12969  [pdf

    cs.CR

    A Taxonomy for Dynamic Honeypot Measures of Effectiveness

    Authors: Jason M. Pittman, Kyle Hoffpauir, Nathan Markle, Cameron Meadows

    Abstract: Honeypots are computing systems used to capture unauthorized, often malicious, activity. While honeypots can take on a variety of forms, researchers agree the technology is useful for studying adversary behavior, tools, and techniques. Unfortunately, researchers also agree honeypots are difficult to implement and maintain. A lack of measures of effectiveness compounds the implementation issues spe… ▽ More

    Submitted 26 May, 2020; originally announced May 2020.

    Comments: 10 pages, 4 figures, 2 tables

  11. arXiv:2001.04930  [pdf

    cs.CR cs.CY

    Shades of Perception- User Factors in Identifying Password Strength

    Authors: Jason M. Pittman, Nikki Robinson

    Abstract: The purpose of this study was to measure whether participant education, profession, and technical skill level exhibited a relationship with identification of password strength. Participants reviewed 50 passwords and labeled each as weak or strong. A Chi-square test of independence was used to measure relationships between education, profession, technical skill level relative to the frequency of we… ▽ More

    Submitted 14 January, 2020; originally announced January 2020.

    Comments: 18 pages, 6 tables, 6 figures

  12. arXiv:1811.03653  [pdf

    cs.AI

    Stovepiping and Malicious Software: A Critical Review of AGI Containment

    Authors: Jason M. Pittman, Jesus P. Espinoza, Courtney Crosby

    Abstract: Awareness of the possible impacts associated with artificial intelligence has risen in proportion to progress in the field. While there are tremendous benefits to society, many argue that there are just as many, if not more, concerns related to advanced forms of artificial intelligence. Accordingly, research into methods to develop artificial intelligence safely is increasingly important. In this… ▽ More

    Submitted 1 August, 2021; v1 submitted 8 November, 2018; originally announced November 2018.

    Comments: Updated author name

  13. arXiv:1801.09317  [pdf

    cs.AI

    A Cyber Science Based Ontology for Artificial General Intelligence Containment

    Authors: Jason M. Pittman, Courtney Crosby

    Abstract: The development of artificial general intelligence is considered by many to be inevitable. What such intelligence does after becoming aware is not so certain. To that end, research suggests that the likelihood of artificial general intelligence becoming hostile to humans is significant enough to warrant inquiry into methods to limit such potential. Thus, containment of artificial general intellige… ▽ More

    Submitted 1 August, 2021; v1 submitted 28 January, 2018; originally announced January 2018.

    Comments: 12 pages, 4 figures, 3 tables Updated author name