Skip to main content

Showing 1–2 of 2 results for author: Loesch, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.16131  [pdf

    cs.CR

    Secure Arcade: A Gamified Defense Against Cyber Attacks

    Authors: Sean Loesch, Ryan Hrastich, Jordan Herbert, Ben Drangstveit, Jacob Weber, Mounika Vanamala

    Abstract: In modernity, we continually receive increasingly intricate technologies that allow us to increase our lives convenience and efficiency. Our technology, particularly technology available over the internet, is advancing at unprecedented speed. However, this speed of advancement allows those behind malicious attacks to have an increasingly easier time taking advantage of those who know little about… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  2. arXiv:2308.05558  [pdf

    cs.SE

    Using Machine Learning To Identify Software Weaknesses From Software Requirement Specifications

    Authors: Mounika Vanamala, Sean Loesch, Alexander Caravella

    Abstract: Secure software engineering is crucial but can be time-consuming; therefore, methods that could expedite the identification of software weaknesses without reducing the process efficacy would benefit the software engineering industry and thus benefit modern life. This research focuses on finding an efficient machine learning algorithm to identify software weaknesses from requirement specifications.… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.