Search Results - "Haile, Jed"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Binary Analysis with Architecture and Code Section Detection using Supervised Machine Learning by Beckman, Bryan, Haile, Jed

    “…When presented with an unknown binary, which may or may not be complete, having the ability to determine information about it is critical to future reverse…”
    Get full text
    Conference Proceeding
  2. 2

    Data Collection and Exploratory Analysis for Cyber Threat Intelligence Machine Learning Processes by Wolf, Shaya, Foster, Rita, Mack, Andrea, Priest, Zachary, Haile, Jed

    “…Cyber threat intelligence powers machine learning and other data analysis techniques that provide enhanced protection and situational awareness to critical…”
    Get full text
    Conference Proceeding
  3. 3

    Data-Driven Suitability Analysis to Enable Machine Learning Explainability and Security by Wolf, Shaya, Foster, Rita, Haile, Jed, Borowczak, Mike

    Published in 2021 Resilience Week (RWS) (18-10-2021)
    “…This work posits that suitability analyses that pair machine learning best practices with domain knowledge mapped to statistically significant metrics can…”
    Get full text
    Conference Proceeding
  4. 4

    Comparing Ransomware using TLSH and @DisCo Analysis Frameworks by Cooley, Rafer, Cutshaw, Michael, Wolf, Shaya, Foster, Rita, Haile, Jed, Borowczak, Mike

    “…Modern malware indicators utilized by the current top threat feeds are easily bypassed and generated through enigmatic methods, leading to a lack of detection…”
    Get full text
    Conference Proceeding