Threat actors are operationalizing AI to scale and sustain malicious activity, accelerating tradecraft and increasing risk for defenders, as illustrated by recent activity from North Korean groups ...
Abstract: Business email compromise is a tool used by adversaries to attack various organizations. Detecting such cyberattacks using well-known methods is becoming increasingly difficult. This paper ...
This repository provides code and workflows to test several state-of-the-art vehicle detection deep learning algorithms —including YOLOX, SalsaNext, RandLA-Net, and VoxelRCNN— on a Flash Lidar dataset ...
Abstract: In recent years, the receipt of spam by billions of users around the world has increased. In general, for spam emails are admitted all emails that is sent without the express consent of the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results