IUScholarWorksIndiana University Libraries
Communities & Collections
All of IUScholarWorks
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
External Users Only:
New external user? Click here to register. Have you forgotten your external user password?
  1. Home
  2. Browse by Author

Browsing by Author "Adams, Emily K."

Filter results by typing the first few letters
Now showing 1 - 2 of 2
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Item
    2020 CACR AI/ML Lessons Learned Report
    (2020-07-31) Kiser, Ryan; Adams, Emily K.; Cushenberry, Austin; Abhinit, Ishan; Shute, Kelli
    Since Fall of 2019, the Indiana University Center for Applied Cybersecurity Research (CACR) has been exploring the application of machine learning to cybersecurity workflows with the intent of developing the applicable expertise necessary to maintain a commanding lead in the cybersecurity domain where machine learning solutions are expected to increasingly become the norm. In order to serve the objectives laid out in the project charter, CACR primarily worked in partnership with OmniSOC and researchers at Rochester Institute of Technology to explore the application of the ASSERT research prototype to SOC analyst workflows. The intent of this effort was to better understand both the utility of the ASSERT prototype and the challenges associated with the implementation of machine learning approaches to cybersecurity workflows more broadly.
  • Loading...
    Thumbnail Image
    Item
    Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®
    (2022-08) Adams, Emily K.
    In this paper malicious tactics and techniques leveraged to explicitly manipulate the integrity of transient workflow data, data products, or derived metadata within scientific workflows are considered. This document leverages the MITRE ATT&CK Enterprise knowledge base of adversary tactics and techniques, based on real-world observations, as the foundation for a scoped analysis enumerating malicious attacks against data integrity within scientific workflows.
  • Accessibility
  • Privacy Notice
  • Harmful Language Statement
  • Copyright © 2024 The Trustees of Indiana University