no code implementations • 11 Nov 2023 • Aina Tersol Montserrat, Alexander R. Loftus, Yael Daihes
In machine learning, classification tasks serve as the cornerstone of a wide range of real-world applications.
no code implementations • 5 Aug 2020 • Yael Daihes, Hen Tzaban, Asaf Nadler, Asaf Shabtai
In this paper, we present MORTON, a method that identifies compromised devices in enterprise networks based on the existence of routine DNS communication between devices and disreputable host names.
Cryptography and Security