-
Resolving the W-Boson Mass in the Lepton Specific Two Higgs Doublet Model
Authors:
Ali Cici,
Huseyin Dag
Abstract:
In this study, the parameter space of the Lepton Specific Two Higgs Doublet Model (LS-2HDM) is investigated to align the W-boson mass reported by the CDF experiment with recent theoretical and experimental findings. The Lepton Specific Two Higgs Doublet Model, a distinguished category within Two Higgs Doublet Models, contains two CP-even, one CP-odd, and two charged scalar bosons, which play cruci…
▽ More
In this study, the parameter space of the Lepton Specific Two Higgs Doublet Model (LS-2HDM) is investigated to align the W-boson mass reported by the CDF experiment with recent theoretical and experimental findings. The Lepton Specific Two Higgs Doublet Model, a distinguished category within Two Higgs Doublet Models, contains two CP-even, one CP-odd, and two charged scalar bosons, which play crucial role in estimating W boson mass. First, constraints from diverse experimental data, including ATLAS 13 TeV analyses, rare B-meson decays, and Lepton Flavor Universality in tau-lepton and Z-boson decays, are determined and imposed on the parameter space of the model. These constraints are subsequently applied to potential solutions generated through random scans using SARAH 4.13.0 and analyzed using SPheno 4.0.3. The analysis indicates the possibility of realizing the CDF-reported W-boson mass up to $1σ$ within the low $\tanβ$ regime ($2.5 \lesssim \tanβ\lesssim 8.0 $). Furthermore, it establishes mass limits for the additional scalar boson as $164 \lesssim m_{h_2} \lesssim 195 $ GeV, $330 \lesssim m_{A} \lesssim 575 $ GeV, and $345 \lesssim m_{H^\pm} \lesssim 685 $ GeV. Moreover, it is observed that instead of the masses, mass differences of the new scalars of the model are more constrained to assure the CDF reported value of the W boson. Finally, all potential solutions estimating the W-boson mass within a $1σ$ vicinity are rigorously tested using the HiggsTools package. Remarkably, only one solution remains valid, estimating $M_W=80.4103$ GeV within a $2.44σ$ vicinity of the CDF-reported value.
△ Less
Submitted 16 March, 2024;
originally announced March 2024.
-
Phishing Website Detection through Multi-Model Analysis of HTML Content
Authors:
Furkan Çolhak,
Mert İlhan Ecevit,
Bilal Emir Uçar,
Reiner Creutzburg,
Hasan Dağ
Abstract:
The way we communicate and work has changed significantly with the rise of the Internet. While it has opened up new opportunities, it has also brought about an increase in cyber threats. One common and serious threat is phishing, where cybercriminals employ deceptive methods to steal sensitive information.This study addresses the pressing issue of phishing by introducing an advanced detection mode…
▽ More
The way we communicate and work has changed significantly with the rise of the Internet. While it has opened up new opportunities, it has also brought about an increase in cyber threats. One common and serious threat is phishing, where cybercriminals employ deceptive methods to steal sensitive information.This study addresses the pressing issue of phishing by introducing an advanced detection model that meticulously focuses on HTML content. Our proposed approach integrates a specialized Multi-Layer Perceptron (MLP) model for structured tabular data and two pretrained Natural Language Processing (NLP) models for analyzing textual features such as page titles and content. The embeddings from these models are harmoniously combined through a novel fusion process. The resulting fused embeddings are then input into a linear classifier. Recognizing the scarcity of recent datasets for comprehensive phishing research, our contribution extends to the creation of an up-to-date dataset, which we openly share with the community. The dataset is meticulously curated to reflect real-life phishing conditions, ensuring relevance and applicability. The research findings highlight the effectiveness of the proposed approach, with the CANINE demonstrating superior performance in analyzing page titles and the RoBERTa excelling in evaluating page content. The fusion of two NLP and one MLP model,termed MultiText-LP, achieves impressive results, yielding a 96.80 F1 score and a 97.18 accuracy score on our research dataset. Furthermore, our approach outperforms existing methods on the CatchPhish HTML dataset, showcasing its efficacies.
△ Less
Submitted 10 July, 2024; v1 submitted 9 January, 2024;
originally announced January 2024.
-
SecureReg: Combining NLP and MLP for Enhanced Detection of Malicious Domain Name Registrations
Authors:
Furkan Çolhak,
Mert İlhan Ecevit,
Hasan Dağ,
Reiner Creutzburg
Abstract:
The escalating landscape of cyber threats, characterized by the registration of thousands of new domains daily for large-scale Internet attacks such as spam, phishing, and drive-by downloads, underscores the imperative for innovative detection methodologies. This paper introduces a cutting-edge approach for identifying suspicious domains at the onset of the registration process. The accompanying d…
▽ More
The escalating landscape of cyber threats, characterized by the registration of thousands of new domains daily for large-scale Internet attacks such as spam, phishing, and drive-by downloads, underscores the imperative for innovative detection methodologies. This paper introduces a cutting-edge approach for identifying suspicious domains at the onset of the registration process. The accompanying data pipeline generates crucial features by comparing new domains to registered domains, emphasizing the crucial similarity score. The proposed system analyzes semantic and numerical attributes by leveraging a novel combination of Natural Language Processing (NLP) techniques, including a pretrained CANINE model and Multilayer Perceptron (MLP) models, providing a robust solution for early threat detection. This integrated Pretrained NLP (CANINE) + MLP model showcases the outstanding performance, surpassing both individual pretrained NLP models and standalone MLP models. With an F1 score of 84.86\% and an accuracy of 84.95\% on the SecureReg dataset, it effectively detects malicious domain registrations. The findings demonstrate the effectiveness of the integrated approach and contribute to the ongoing efforts to develop proactive strategies to mitigate the risks associated with illicit online activities through the early identification of suspicious domain registrations.
△ Less
Submitted 10 July, 2024; v1 submitted 6 January, 2024;
originally announced January 2024.
-
The ECFA Early Career Researcher's Panel: composition, structure, and activities, 2021 -- 2022
Authors:
ECFA Early-Career Researcher Panel,
:,
Andrei Alexandru Geanta,
Chiara Amendola,
Liliana Apolinario,
Jan-Hendrik Arling,
Adi Ashkenazi,
Kamil Augsten,
Emanuele Bagnaschi,
Evelin Bakos,
Liron Barak,
Diogo Bastos,
Giovanni Benato,
Bugra Bilin,
Neven Blaskovic Kraljevic,
Lydia Brenner,
Francesco Brizioli,
Antoine Camper,
Alessandra Camplani,
Xabier Cid Vidal,
Hüseyin Dag,
Flavia de Almeida Dias,
Jordy Degens,
Eleonora Diociaiuti,
Laurent Dufour
, et al. (52 additional authors not shown)
Abstract:
The European Committee for Future Accelerators (ECFA) Early Career Researcher's (ECR) panel, which represents the interests of the ECR community to ECFA, officially began its activities in January 2021. In the first two years, the panel has defined its own internal structure, responded to ECFA requests for feedback, and launched its own initiatives to better understand and support the diverse inte…
▽ More
The European Committee for Future Accelerators (ECFA) Early Career Researcher's (ECR) panel, which represents the interests of the ECR community to ECFA, officially began its activities in January 2021. In the first two years, the panel has defined its own internal structure, responded to ECFA requests for feedback, and launched its own initiatives to better understand and support the diverse interests of early career researchers. This report summarises the panel composition and structure, as well as the different activities the panel has been involved with during the first two years of its existence.
△ Less
Submitted 20 December, 2022;
originally announced December 2022.
-
An Ensemble of Pre-trained Transformer Models For Imbalanced Multiclass Malware Classification
Authors:
Ferhat Demirkıran,
Aykut Çayır,
Uğur Ünal,
Hasan Dağ
Abstract:
Classification of malware families is crucial for a comprehensive understanding of how they can infect devices, computers, or systems. Thus, malware identification enables security researchers and incident responders to take precautions against malware and accelerate mitigation. API call sequences made by malware are widely utilized features by machine and deep learning models for malware classifi…
▽ More
Classification of malware families is crucial for a comprehensive understanding of how they can infect devices, computers, or systems. Thus, malware identification enables security researchers and incident responders to take precautions against malware and accelerate mitigation. API call sequences made by malware are widely utilized features by machine and deep learning models for malware classification as these sequences represent the behavior of malware. However, traditional machine and deep learning models remain incapable of capturing sequence relationships between API calls. On the other hand, the transformer-based models process sequences as a whole and learn relationships between API calls due to multi-head attention mechanisms and positional embeddings. Our experiments demonstrate that the transformer model with one transformer block layer surpassed the widely used base architecture, LSTM. Moreover, BERT or CANINE, pre-trained transformer models, outperformed in classifying highly imbalanced malware families according to evaluation metrics, F1-score, and AUC score. Furthermore, the proposed bagging-based random transformer forest (RTF), an ensemble of BERT or CANINE, has reached the state-of-the-art evaluation scores on three out of four datasets, particularly state-of-the-art F1-score of 0.6149 on one of the commonly used benchmark dataset.
△ Less
Submitted 22 June, 2022; v1 submitted 25 December, 2021;
originally announced December 2021.
-
Benchmark Static API Call Datasets for Malware Family Classification
Authors:
Berkant Düzgün,
Aykut Çayır,
Ferhat Demirkıran,
Ceyda Nur Kahya,
Buket Gençaydın,
Hasan Dağ
Abstract:
Nowadays, malware and malware incidents are increasing daily, even with various antivirus systems and malware detection or classification methodologies. Machine learning techniques have been the main focus of the security experts to detect malware and determine their families. Many static, dynamic, and hybrid techniques have been presented for that purpose. In this study, the static analysis techn…
▽ More
Nowadays, malware and malware incidents are increasing daily, even with various antivirus systems and malware detection or classification methodologies. Machine learning techniques have been the main focus of the security experts to detect malware and determine their families. Many static, dynamic, and hybrid techniques have been presented for that purpose. In this study, the static analysis technique has been applied to malware samples to extract API calls, which is one of the most used features in machine/deep learning models as it represents the behavior of malware samples.
Since the rapid increase and continuous evolution of malware affect the detection capacity of antivirus scanners, recent and updated datasets of malicious software became necessary to overcome this drawback. This paper introduces two new datasets: One with 14,616 samples obtained and compiled from VirusShare and one with 9,795 samples from VirusSample. In addition, benchmark results based on static API calls of malware samples are presented using several machine and deep learning models on these datasets. We believe that these two datasets and benchmark results enable researchers to test and validate their methods and approaches in this field.
△ Less
Submitted 4 August, 2022; v1 submitted 30 November, 2021;
originally announced November 2021.
-
Results of the 2021 ECFA Early-Career Researcher Survey on Training in Instrumentation
Authors:
ECFA Early-Career Researcher Panel,
:,
Anamika Aggarwal,
Chiara Amendola,
Liliana Apolinario,
Jan-Hendrik Arling,
Adi Ashkenazi,
Kamil Augsten,
Julien Baglio,
Evelin Bakos,
Liron Barak,
Diogo Bastos,
Bugra Bilin,
Silvia Biondi,
Neven Blaskovic Kraljevic,
Lydia Brenner,
Francesco Brizioli,
Antoine Camper,
Alessandra Camplani,
Xabier Cid Vidal,
Hüseyin Dag,
Flavia de Almeida Dias,
Eleonora Diociaiuti,
Lennart van Doremalen,
Katherine Dunne
, et al. (52 additional authors not shown)
Abstract:
The European Committee for Future Accelerators (ECFA) Early-Career Researchers (ECR) Panel was invited by the ECFA Detector R&D Roadmap conveners to collect feedback from the European ECR community. A working group within the ECFA ECR panel held a Townhall Meeting to get first input, and then designed and broadly circulated a detailed survey to gather feedback from the larger ECR community. A tota…
▽ More
The European Committee for Future Accelerators (ECFA) Early-Career Researchers (ECR) Panel was invited by the ECFA Detector R&D Roadmap conveners to collect feedback from the European ECR community. A working group within the ECFA ECR panel held a Townhall Meeting to get first input, and then designed and broadly circulated a detailed survey to gather feedback from the larger ECR community. A total of 473 responses to this survey were received, providing a useful overview of the experiences of ECRs in instrumentation training and related topics. This report summarises the feedback received, and is intended to serve as an input to the ECFA Detector R&D Roadmap process.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
Random CapsNet Forest Model for Imbalanced Malware Type Classification Task
Authors:
Aykut Çayır,
Uğur Ünal,
Hasan Dağ
Abstract:
Behavior of a malware varies with respect to malware types. Therefore,knowing type of a malware affects strategies of system protection softwares. Many malware type classification models empowered by machine and deep learning achieve superior accuracies to predict malware types.Machine learning based models need to do heavy feature engineering and feature engineering is dominantly effecting perfor…
▽ More
Behavior of a malware varies with respect to malware types. Therefore,knowing type of a malware affects strategies of system protection softwares. Many malware type classification models empowered by machine and deep learning achieve superior accuracies to predict malware types.Machine learning based models need to do heavy feature engineering and feature engineering is dominantly effecting performance of models.On the other hand, deep learning based models require less feature engineering than machine learning based models. However, traditional deep learning architectures and components cause very complex and data sensitive models. Capsule network architecture minimizes this complexity and data sensitivity unlike classical convolutional neural network architectures. This paper proposes an ensemble capsule network model based on bootstrap aggregating technique. The proposed method are tested on two malware datasets, whose the-state-of-the-art results are well-known.
△ Less
Submitted 23 August, 2020; v1 submitted 20 December, 2019;
originally announced December 2019.
-
$B \rightarrow T$ transition form factors in light-cone sum rules
Authors:
T. M. Aliev,
H. Dag,
A. Kokulu,
A. Ozpineci
Abstract:
We present a new calculation of the semileptonic tree-level and flavor-changing neutral current form factors describing $B$-meson transitions to tensor mesons $T=D_2^*,K_2^*,a_2,f_2$ ($J^{P}=2^{+}$). We employ the QCD Light-Cone Sum Rules approach with $B$-meson distribution amplitudes. We go beyond the leading-twist accuracy and provide analytically, for the first time, higher-twist corrections f…
▽ More
We present a new calculation of the semileptonic tree-level and flavor-changing neutral current form factors describing $B$-meson transitions to tensor mesons $T=D_2^*,K_2^*,a_2,f_2$ ($J^{P}=2^{+}$). We employ the QCD Light-Cone Sum Rules approach with $B$-meson distribution amplitudes. We go beyond the leading-twist accuracy and provide analytically, for the first time, higher-twist corrections for the two-particle contributions up to twist four terms. We observe that the impact of higher twist terms to the sum rules is noticeable. We study the phenomenological implications of our results on the radiative ${B} \to K_2^{*}γ$ and semileptonic ${B} \to D_2^* \ell {\bar ν}_\ell$, ${B} \to K_2^{*}\ell^+\ell^-$ decays.
△ Less
Submitted 3 November, 2019; v1 submitted 2 August, 2019;
originally announced August 2019.
-
Hidden-Beauty Broad Resonance $Y_b(10890)$ in Thermal QCD
Authors:
J. Y. Süngü,
A. Türkan,
H. Dağ,
E. Veli Veliev
Abstract:
In this work, the mass and pole residue of resonance $Y_b$ is studied by using QCD sum rules approach at finite temperature. Resonance $Y_b$ is described by a diquark-antidiquark tetraquark current, and contributions to operator product expansion are calculated by including QCD condensates up to dimension six. Temperature dependences of the mass $m_{Y_b}$ and the pole residue $λ_{Y_b}$ are investi…
▽ More
In this work, the mass and pole residue of resonance $Y_b$ is studied by using QCD sum rules approach at finite temperature. Resonance $Y_b$ is described by a diquark-antidiquark tetraquark current, and contributions to operator product expansion are calculated by including QCD condensates up to dimension six. Temperature dependences of the mass $m_{Y_b}$ and the pole residue $λ_{Y_b}$ are investigated. It is seen that near a critical temperature $(T_c\simeq190~\mathrm{MeV})$, the values of $m_{Y_b}$ and $λ_{Y_b}$ are decreased to $87\%$, and to $44\%$ of their values at vacuum.
△ Less
Submitted 19 September, 2018;
originally announced September 2018.
-
Exploratory study of X(4140) in QCD sum rules
Authors:
Arzu Turkan,
Huseyin Dag
Abstract:
In this work, we chose three molecular and three diquark-antidiquark currents with the quark content $c\bar{c}s\bar{s}$ and $J^{PC}=0^{++},1^{++},2^{++}$, and estimated the masses and the meson coupling constants of the ground states coupling to these currents in the framework of QCD sum rules. In operator product expansion, we considered the terms including dimension eight, and we performed pole…
▽ More
In this work, we chose three molecular and three diquark-antidiquark currents with the quark content $c\bar{c}s\bar{s}$ and $J^{PC}=0^{++},1^{++},2^{++}$, and estimated the masses and the meson coupling constants of the ground states coupling to these currents in the framework of QCD sum rules. In operator product expansion, we considered the terms including dimension eight, and we performed pole contribution tests carefully. According to our results, all of these currents couple to the ground states with degenerate masses which are in 10 MeV vicinity of X(4140). Therefore, with a QCD sum rules analysis, it is not possible to conclude that X(4140) has a dominant molecular or diquark-antidiquark content. However, there may be three states degenerate in mass, with positive charge conjugation and different isospins.
△ Less
Submitted 7 May, 2017;
originally announced May 2017.
-
Pair production of single and double charged scalar pairs and their lepton flavor violating signals in the littlest Higgs model at LHC
Authors:
Ayse Cagil,
Huseyin Dag
Abstract:
In this work productions of charged and doubly charged scalars and their lepton flavor violating collider signals in the framework of littlest Higgs model at LHC are studied. In the allowed parameter region of the littlest Higgs model, the production rates of the scalars of littlest Higgs model via $pp \to φ^{++}φ^{-}$, $pp \to φ^+φ^-$ and $pp \to φ^{++}φ^{--}$ processes are calculated. We obtaine…
▽ More
In this work productions of charged and doubly charged scalars and their lepton flavor violating collider signals in the framework of littlest Higgs model at LHC are studied. In the allowed parameter region of the littlest Higgs model, the production rates of the scalars of littlest Higgs model via $pp \to φ^{++}φ^{-}$, $pp \to φ^+φ^-$ and $pp \to φ^{++}φ^{--}$ processes are calculated. We obtained that charged and doubly charged scalar pairs can be produced at LHC . Considering the possible lepton flavor violating decays of charged scalars found in literature, final state analysis is done. This analysis show that depending on the model parameters, lepton number and lepton flavor violations resulting from single and double charged heavy scalars of the littlest Higgs model can be observed at LHC.
△ Less
Submitted 10 March, 2012;
originally announced March 2012.
-
The Semileptonic $B$ to $K_1(1270,1400)$ Decays in QCD Sum Rules
Authors:
H. Dag,
A. Ozpineci,
M. T. Zeyrek
Abstract:
We analyze the semileptonic rare decays of $B$ meson to $K_{1} (1270)$ and $K_{1} (1400)$ axial vector mesons. The $B\to K_{1} (1270,1400) \ell^+ \ell^-$ decays are significant flavor changing neutral current decays of the $B$ meson. These decays are sensitive to the new physics beyond SM, since these processes are forbidden at tree level at SM. These decays occurring at the quark level via…
▽ More
We analyze the semileptonic rare decays of $B$ meson to $K_{1} (1270)$ and $K_{1} (1400)$ axial vector mesons. The $B\to K_{1} (1270,1400) \ell^+ \ell^-$ decays are significant flavor changing neutral current decays of the $B$ meson. These decays are sensitive to the new physics beyond SM, since these processes are forbidden at tree level at SM. These decays occurring at the quark level via $b\to s \ell^+ \ell^- $ transition, also provide new opportunities for calculating the CKM matrix elements $V_{bt}$ and $V_{ts}$. In this study, the transition form factors of the $B\to K_{1} (1270,1400) \ell^+ \ell^-$ decays are calculated using three-point QCD sum rules approach. The resulting form factors are used to estimate the branching fractions of these decays.
△ Less
Submitted 22 November, 2010; v1 submitted 6 January, 2010;
originally announced January 2010.