Skip to main content

Showing 1–4 of 4 results for author: Cotton, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.03532  [pdf

    cs.CR cs.AI cs.LG

    Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning

    Authors: Arshiya Khan, Chase Cotton

    Abstract: Through the generalization of deep learning, the research community has addressed critical challenges in the network security domain, like malware identification and anomaly detection. However, they have yet to discuss deploying them on Internet of Things (IoT) devices for day-to-day operations. IoT devices are often limited in memory and processing power, rendering the compute-intensive deep lear… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

    Journal ref: International Journal of Computer Science and Information Technology, vol. 14, no. 6, 2022, pp. 47-64

  2. arXiv:2205.09185  [pdf, other

    physics.ins-det cs.LG hep-ex nucl-ex physics.comp-ph

    AI-assisted Optimization of the ECCE Tracking System at the Electron Ion Collider

    Authors: C. Fanelli, Z. Papandreou, K. Suresh, J. K. Adkins, Y. Akiba, A. Albataineh, M. Amaryan, I. C. Arsene, C. Ayerbe Gayoso, J. Bae, X. Bai, M. D. Baker, M. Bashkanov, R. Bellwied, F. Benmokhtar, V. Berdnikov, J. C. Bernauer, F. Bock, W. Boeglin, M. Borysova, E. Brash, P. Brindza, W. J. Briscoe, M. Brooks, S. Bueltmann , et al. (258 additional authors not shown)

    Abstract: The Electron-Ion Collider (EIC) is a cutting-edge accelerator facility that will study the nature of the "glue" that binds the building blocks of the visible matter in the universe. The proposed experiment will be realized at Brookhaven National Laboratory in approximately 10 years from now, with detector design and R&D currently ongoing. Notably, EIC is one of the first large-scale facilities to… ▽ More

    Submitted 19 May, 2022; v1 submitted 18 May, 2022; originally announced May 2022.

    Comments: 16 pages, 18 figures, 2 appendices, 3 tables

  3. Detecting Attacks on IoT Devices using Featureless 1D-CNN

    Authors: Arshiya Khan, Chase Cotton

    Abstract: The generalization of deep learning has helped us, in the past, address challenges such as malware identification and anomaly detection in the network security domain. However, as effective as it is, scarcity of memory and processing power makes it difficult to perform these tasks in Internet of Things (IoT) devices. This research finds an easy way out of this bottleneck by depreciating the need f… ▽ More

    Submitted 8 September, 2021; originally announced September 2021.

    Journal ref: IEEE International Conference on Cyber Security and Resilience (CSR), 2021, pp. 461-466

  4. arXiv:2106.15285  [pdf, other

    cs.CR cs.CY cs.LG stat.AP

    Anomaly Detection and Automated Labeling for Voter Registration File Changes

    Authors: Sam Royston, Ben Greenberg, Omeed Tavasoli, Courtenay Cotton

    Abstract: Voter eligibility in United States elections is determined by a patchwork of state databases containing information about which citizens are eligible to vote. Administrators at the state and local level are faced with the exceedingly difficult task of ensuring that each of their jurisdictions is properly managed, while also monitoring for improper modifications to the database. Monitoring changes… ▽ More

    Submitted 16 June, 2021; originally announced June 2021.