Skip to main content

Showing 1–13 of 13 results for author: Frappier, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2411.16642  [pdf, other

    cs.CR cs.CL

    Preventing Jailbreak Prompts as Malicious Tools for Cybercriminals: A Cyber Defense Perspective

    Authors: Jean Marie Tshimula, Xavier Ndona, D'Jeff K. Nkashama, Pierre-Martin Tardif, Froduald Kabanza, Marc Frappier, Shengrui Wang

    Abstract: Jailbreak prompts pose a significant threat in AI and cybersecurity, as they are crafted to bypass ethical safeguards in large language models, potentially enabling misuse by cybercriminals. This paper analyzes jailbreak prompts from a cyber defense perspective, exploring techniques like prompt injection and context manipulation that allow harmful content generation, content filter evasion, and se… ▽ More

    Submitted 25 November, 2024; originally announced November 2024.

  2. arXiv:2411.07272  [pdf, other

    cs.SE cs.LG

    ASTD Patterns for Integrated Continuous Anomaly Detection In Data Logs

    Authors: Chaymae El Jabri, Marc Frappier, Pierre-Martin Tardif

    Abstract: This paper investigates the use of the ASTD language for ensemble anomaly detection in data logs. It uses a sliding window technique for continuous learning in data streams, coupled with updating learning models upon the completion of each window to maintain accurate detection and align with current data trends. It proposes ASTD patterns for combining learning models, especially in the context of… ▽ More

    Submitted 14 December, 2024; v1 submitted 10 November, 2024; originally announced November 2024.

  3. arXiv:2408.07718  [pdf, other

    cs.LG cs.AI

    Impact of Inaccurate Contamination Ratio on Robust Unsupervised Anomaly Detection

    Authors: Jordan F. Masakuna, DJeff Kanda Nkashama, Arian Soltani, Marc Frappier, Pierre-Martin Tardif, Froduald Kabanza

    Abstract: Training data sets intended for unsupervised anomaly detection, typically presumed to be anomaly-free, often contain anomalies (or contamination), a challenge that significantly undermines model performance. Most robust unsupervised anomaly detection models rely on contamination ratio information to tackle contamination. However, in reality, contamination ratio may be inaccurate. We investigate on… ▽ More

    Submitted 14 August, 2024; originally announced August 2024.

    Comments: This is an accepted extended abstract at Black in AI Workshop which will be co-located with NeurIPS 2024 in Canada

  4. arXiv:2407.08838  [pdf, other

    cs.LG cs.CR cs.NI

    Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation

    Authors: D'Jeff K. Nkashama, Jordan Masakuna Félicien, Arian Soltani, Jean-Charles Verdier, Pierre-Martin Tardif, Marc Frappier, Froduald Kabanza

    Abstract: Deep learning (DL) has emerged as a crucial tool in network anomaly detection (NAD) for cybersecurity. While DL models for anomaly detection excel at extracting features and learning patterns from data, they are vulnerable to data contamination -- the inadvertent inclusion of attack-related data in training sets presumed benign. This study evaluates the robustness of six unsupervised DL algorithms… ▽ More

    Submitted 12 September, 2024; v1 submitted 11 July, 2024; originally announced July 2024.

    Comments: arXiv admin note: text overlap with arXiv:2207.03576

  5. arXiv:2406.18783  [pdf, other

    cs.CL cs.LG

    Psychological Profiling in Cybersecurity: A Look at LLMs and Psycholinguistic Features

    Authors: Jean Marie Tshimula, D'Jeff K. Nkashama, Jean Tshibangu Muabila, René Manassé Galekwa, Hugues Kanda, Maximilien V. Dialufuma, Mbuyi Mukendi Didier, Kalonji Kalala, Serge Mundele, Patience Kinshie Lenye, Tighana Wenge Basele, Aristarque Ilunga, Christian N. Mayemba, Nathanaël M. Kasoro, Selain K. Kasereka, Hardy Mikese, Pierre-Martin Tardif, Marc Frappier, Froduald Kabanza, Belkacem Chikhaoui, Shengrui Wang, Ali Mulenda Sumbu, Xavier Ndona, Raoul Kienge-Kienge Intudi

    Abstract: The increasing sophistication of cyber threats necessitates innovative approaches to cybersecurity. In this paper, we explore the potential of psychological profiling techniques, particularly focusing on the utilization of Large Language Models (LLMs) and psycholinguistic features. We investigate the intersection of psychology and cybersecurity, discussing how LLMs can be employed to analyze textu… ▽ More

    Submitted 9 August, 2024; v1 submitted 26 June, 2024; originally announced June 2024.

  6. arXiv:2302.03694  [pdf, other

    q-fin.ST cs.AI cs.CL cs.CY cs.LG

    Characterizing Financial Market Coverage using Artificial Intelligence

    Authors: Jean Marie Tshimula, D'Jeff K. Nkashama, Patrick Owusu, Marc Frappier, Pierre-Martin Tardif, Froduald Kabanza, Armelle Brun, Jean-Marc Patenaude, Shengrui Wang, Belkacem Chikhaoui

    Abstract: This paper scrutinizes a database of over 4900 YouTube videos to characterize financial market coverage. Financial market coverage generates a large number of videos. Therefore, watching these videos to derive actionable insights could be challenging and complex. In this paper, we leverage Whisper, a speech-to-text model from OpenAI, to generate a text corpus of market coverage videos from Bloombe… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

  7. arXiv:2207.03576  [pdf, other

    cs.CR cs.LG cs.NI

    Robustness Evaluation of Deep Unsupervised Learning Algorithms for Intrusion Detection Systems

    Authors: D'Jeff Kanda Nkashama, Arian Soltani, Jean-Charles Verdier, Marc Frappier, Pierre-Martin Tardif, Froduald Kabanza

    Abstract: Recently, advances in deep learning have been observed in various fields, including computer vision, natural language processing, and cybersecurity. Machine learning (ML) has demonstrated its ability as a potential tool for anomaly detection-based intrusion detection systems to build secure computer networks. Increasingly, ML approaches are widely adopted than heuristic approaches for cybersecurit… ▽ More

    Submitted 30 October, 2023; v1 submitted 24 June, 2022; originally announced July 2022.

    Comments: Machine Learning for Cybersecurity Workshop at the International Conference on Machine Learning(ICLR-ML4CY)

  8. arXiv:2204.09825  [pdf, other

    cs.LG cs.AI cs.CR

    A Revealing Large-Scale Evaluation of Unsupervised Anomaly Detection Algorithms

    Authors: Maxime Alvarez, Jean-Charles Verdier, D'Jeff K. Nkashama, Marc Frappier, Pierre-Martin Tardif, Froduald Kabanza

    Abstract: Anomaly detection has many applications ranging from bank-fraud detection and cyber-threat detection to equipment maintenance and health monitoring. However, choosing a suitable algorithm for a given application remains a challenging design decision, often informed by the literature on anomaly detection algorithms. We extensively reviewed twelve of the most popular unsupervised anomaly detection m… ▽ More

    Submitted 20 April, 2022; originally announced April 2022.

  9. arXiv:1811.04732  [pdf, other

    cs.SE

    The Generic SysML/KAOS Domain Metamodel

    Authors: Steve Jeffrey Tueno Fotso, Marc Frappier, Régine Laleau, Amel Mammar, Hector Ruiz Barradas

    Abstract: This paper is related to the generalised/generic version of the SysML/KAOS domain metamodel and on translation and back propagation rules between the new domain models and B System specifications.

    Submitted 8 March, 2019; v1 submitted 8 November, 2018; originally announced November 2018.

    Comments: 14 pages. arXiv admin note: text overlap with arXiv:1803.01972

  10. arXiv:1803.01972  [pdf, other

    cs.SE

    SysML/KAOS Domain Models and B System Specifications

    Authors: Steve Jeffrey Tueno Fotso, Marc Frappier, Amel Mammar, Régine Laleau

    Abstract: In this paper, we use a combination of the SysML/KAOS requirements engineering method, an extension of SysML, with concepts of the KAOS goal model, and of the B System formal method. Translation rules from a SysML/KAOS goal model to a B System specification have been defined. They allow to obtain a skeleton of the B System specification. To complete it, we have defined a language to express the do… ▽ More

    Submitted 28 June, 2018; v1 submitted 5 March, 2018; originally announced March 2018.

    Comments: arXiv admin note: text overlap with arXiv:1712.07406

  11. arXiv:1712.07406  [pdf, other

    cs.SE

    Formal Representation of SysML/KAOS Domain Model (Complete Version)

    Authors: Steve Tueno, Régine Laleau, Amel Mammar, Marc Frappier

    Abstract: Nowadays, the usefulness of a formal language for ensuring the consistency of requirements is well established. The work presented here is part of the definition of a formally-grounded, model-based requirements engineering method for critical and complex systems. Requirements are captured through the SysML/KAOS method and the targeted formal specification is written using the Event-B method. First… ▽ More

    Submitted 20 December, 2017; originally announced December 2017.

    Comments: 54 pages

  12. arXiv:1710.00903  [pdf, other

    cs.SE

    The SysML/KAOS Domain Modeling Approach

    Authors: Steve Tueno, Régine Laleau, Amel Mammar, Marc Frappier

    Abstract: A means of building safe critical systems consists of formally modeling the requirements formulated by stakeholders and ensuring their consistency with respect to application domain properties. This paper proposes a metamodel for an ontology modeling formalism based on OWL and PLIB. This modeling formalism is part of a method for modeling the domain of systems whose requirements are captured throu… ▽ More

    Submitted 2 October, 2017; originally announced October 2017.

    Comments: 16 pages

  13. Formal refinement of extended state machines

    Authors: Thomas Fayolle, Marc Frappier, Régine Laleau, Frédéric Gervais

    Abstract: In a traditional formal development process, e.g. using the B method, the informal user requirements are (manually) translated into a global abstract formal specification. This translation is especially difficult to achieve. The Event-B method was developed to incrementally and formally construct such a specification using stepwise refinement. Each increment takes into account new properties and s… ▽ More

    Submitted 7 June, 2016; originally announced June 2016.

    Comments: In Proceedings Refine'15, arXiv:1606.01344

    Journal ref: EPTCS 209, 2016, pp. 1-16