| CARVIEW |
Sign in to view Graham’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Washington DC-Baltimore Area
Sign in to view Graham’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
663 followers
500+ connections
Sign in to view Graham’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Graham
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Graham
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Graham’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
Sign in to view Graham’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
-
I genuinely don't understand the amount of effort we're putting into creating bipedal robots of a similar size and shape to a human. There are so…
I genuinely don't understand the amount of effort we're putting into creating bipedal robots of a similar size and shape to a human. There are so…
Liked by Graham Mueller
-
📢📢 I have a new paper in which I argue that the question “Can we make algorithms fair?” is a category error: https://lnkd.in/euPVpPwn A few years…
📢📢 I have a new paper in which I argue that the question “Can we make algorithms fair?” is a category error: https://lnkd.in/euPVpPwn A few years…
Liked by Graham Mueller
-
Our OpenAI GPT-5.2 model is state-of-the-art on ARC-AGI! An important lesson that the ARC-AGI creators have internalized, but not many others have…
Our OpenAI GPT-5.2 model is state-of-the-art on ARC-AGI! An important lesson that the ARC-AGI creators have internalized, but not many others have…
Liked by Graham Mueller
Experience & Education
-
Leidos
********* ******
-
********** **********
******* *********
-
********* ******** ********** ********* *******
**** ********* *** ******* ******** **********
-
***** *** **********
****** ** ********** ******* ********* undefined
-
-
********** ** ******** ** *******
****** ** ******* ****** ******* ***********
-
View Graham’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Publications
-
Using Hypervectors for Efficient Anomaly Detection in Graph Streams
2024 IEEE 11th International Conference on Data Science and Advanced Analytics (DSAA)
We present an online algorithm for detecting changes in computer network activity. Anomalous activity in IT systems often appear as changes in network topology as edges evolve in a dynamic graph; identifying these behavioral changes can be a challenging task. We propose a method that uses principles of Hyperdimensional Computing to encode graphs to a real valued space where anomalies are easily identifiable. With reasonable assumptions of the baseline edge generating process, our approach…
We present an online algorithm for detecting changes in computer network activity. Anomalous activity in IT systems often appear as changes in network topology as edges evolve in a dynamic graph; identifying these behavioral changes can be a challenging task. We propose a method that uses principles of Hyperdimensional Computing to encode graphs to a real valued space where anomalies are easily identifiable. With reasonable assumptions of the baseline edge generating process, our approach operates in real time and can produce an anomaly score primitive for one sample independently of all others. This score lends itself easily to an online Bayesian confidence estimate in constant memory, which is essential for real-world applications where networks are extremely large and interpretable predictions are needed in real time. We demonstrate the effectiveness of our approach on both synthetic and real-world datasets.
Other authorsSee publication -
Forecasting Network Intrusions from Security Logs Using LSTMs
International Workshop on Deployable Machine Learning for Security Defense (KDD - MLHAT)
Computer network intrusions are of increasing concern to governments, companies, and other institutions. While technologies such as Intrusion Detection Systems (IDS) are growing in sophistication and adoption, early warning of intrusion attempts could help cybersecurity practitioners put defenses in place early and mitigate the effects of cyberattacks. It is widely known that cyberattacks progress through stages, which suggests that forecasting network intrusions may be possible if we are able…
Computer network intrusions are of increasing concern to governments, companies, and other institutions. While technologies such as Intrusion Detection Systems (IDS) are growing in sophistication and adoption, early warning of intrusion attempts could help cybersecurity practitioners put defenses in place early and mitigate the effects of cyberattacks. It is widely known that cyberattacks progress through stages, which suggests that forecasting network intrusions may be possible if we are able to identify certain precursors. Despite this potential, forecasting intrusions remains a difficult problem. By leveraging the rapidly growing and widely varying data available from network monitoring and Security Information and Event Management (SIEM) systems, as well as recent advances in deep learning, we introduce a novel intrusion forecasting application. Using six months of data from a real, large organization, we demonstrate that this provides improved intrusion forecasting accuracy compared to existing methods.
Other authorsSee publication -
Detecting and Annotating Narratives in Social Media: A Vision Paper
The International AAAI Conference on Web and Social Media (ICWSM)
-
Causal discovery of cyber attack phases
2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA)
Causal discovery algorithms are increasingly being used to discover valid, novel, and significant causal relationships from large amounts of observational data. Cyberattacks are hypothesized to evolve according to the Cyber Kill Chain® which consists of a causal model describing the phases of a cyberattack. This paper introduces causal discovery to cybersecurity research and provides evidence of the kill chain with an extensive empirical assessment of two databases of real cyberattacks.
Other authorsSee publication -
Sensor fusion and structured prediction for cyberattack event networks
15th International Workshop on Mining and Learning with Graphs (KDD - MLG)
Early detection of cyberattacks – such as data breaches or ransomware – is critical to mitigate their effects. Despite advances in automated cyberattack sensors, many attacks are still detected days or months after they occur. We propose a new approach using statistical relational learning to fuse cyberattack sensor outputs and generate attack predictions. Leveraging the graphical structures of both sensor outputs and cyberattack events themselves, we achieve higher accuracy than individual…
Early detection of cyberattacks – such as data breaches or ransomware – is critical to mitigate their effects. Despite advances in automated cyberattack sensors, many attacks are still detected days or months after they occur. We propose a new approach using statistical relational learning to fuse cyberattack sensor outputs and generate attack predictions. Leveraging the graphical structures of both sensor outputs and cyberattack events themselves, we achieve higher accuracy than individual sensors by reasoning collectively over both sensors and attacks. In addition to improved accuracy, our predictions also are more useful to analysts because they are structured objects containing details of the predicted attacks. We measure accuracy and scalability in an extensive empirical evaluation of our approach using a database of real cyberattacks against a large corporation. We show that, relative to a sensors-only baseline, our approach increases accuracy by up to seven percent and doubles the lift of high-confidence predictions.
Other authorsSee publication -
Analyzing the perceived severity of cybersecurity threats reported on social media
Proceedings of NAACL-HLT 2019
See publicationBreaking cybersecurity events are shared across a range of websites, including security blogs (FireEye, Kaspersky, etc.), in addition to social media platforms such as Face- book and Twitter. In this paper, we investi- gate methods to analyze the severity of cyber- security threats based on the language that is used to describe them online. A corpus of 6,000 tweets describing software vulnerabilities is annotated with authors’ opinions toward their severity. We show that our corpus supports the…
Breaking cybersecurity events are shared across a range of websites, including security blogs (FireEye, Kaspersky, etc.), in addition to social media platforms such as Face- book and Twitter. In this paper, we investi- gate methods to analyze the severity of cyber- security threats based on the language that is used to describe them online. A corpus of 6,000 tweets describing software vulnerabilities is annotated with authors’ opinions toward their severity. We show that our corpus supports the development of automatic classifiers with high precision for this task. Furthermore, we demonstrate the value of analyzing users’ opinions about the severity of threats reported online as an early indicator of important soft- ware vulnerabilities. We present a simple, yet effective method for linking software vulner- abilities reported in tweets to Common Vul- nerabilities and Exposures (CVEs) in the Na- tional Vulnerability Database (NVD). Using our predicted severity scores, we show that it is possible to achieve a Precision@50 of 0.86 when forecasting high severity vulnerabilities, significantly outperforming a baseline that is based on tweet volume. Finally we show how reports of severe vulnerabilities online are predictive of real-world exploits.
-
Dynamic network formation with reinforcement learning
See publicationWe examine a dynamic model of network formation in which individuals use reinforcement learning to choose their actions. Typically, economic models of network formation assume the entire network structure to be known to all individuals involved. The introduction of reinforcement learning allows us to relax this assumption. Q-learning is a reinforcement learning algorithm from the artificial intelligence literature that allows for state-dependent learning. Using Q-learning, one may allow for…
We examine a dynamic model of network formation in which individuals use reinforcement learning to choose their actions. Typically, economic models of network formation assume the entire network structure to be known to all individuals involved. The introduction of reinforcement learning allows us to relax this assumption. Q-learning is a reinforcement learning algorithm from the artificial intelligence literature that allows for state-dependent learning. Using Q-learning, one may allow for varying degrees of information available to the agents. We determine what networks, if any, the model may converge to in the limit.
More activity by Graham
-
I Know We're in an AI Bubble Because Nobody Wants Me 😭 https://lnkd.in/gd_mjmFJ
I Know We're in an AI Bubble Because Nobody Wants Me 😭 https://lnkd.in/gd_mjmFJ
Liked by Graham Mueller
-
The Trump Administration is on the wrong track for AI — not managing AI risks and not pursuing aspirational AI applications. I spoke with Fast…
The Trump Administration is on the wrong track for AI — not managing AI risks and not pursuing aspirational AI applications. I spoke with Fast…
Liked by Graham Mueller
-
The biggest misconception I hear about GenAI is that it inevitably outputs "slop" because it's trained to output "the average of the internet". But…
The biggest misconception I hear about GenAI is that it inevitably outputs "slop" because it's trained to output "the average of the internet". But…
Liked by Graham Mueller
-
I’ll be at NeurIPS in San Diego ☀️ — feel free to reach out if you’d like to meet up! Excited to highlight two papers led by my students (who will…
I’ll be at NeurIPS in San Diego ☀️ — feel free to reach out if you’d like to meet up! Excited to highlight two papers led by my students (who will…
Liked by Graham Mueller
-
Excited to be a part of the Tech Fellow community, thanks Leidos!
Excited to be a part of the Tech Fellow community, thanks Leidos!
Liked by Graham Mueller
-
Delighted to share that I’ve transferred to Syracuse University along with my advisor Paulo Shakarian, to continue my PhD. I’m incredibly grateful…
Delighted to share that I’ve transferred to Syracuse University along with my advisor Paulo Shakarian, to continue my PhD. I’m incredibly grateful…
Liked by Graham Mueller
-
I'm excited to share that I've been recognized by Workleap as a Top 10% Manager (out of 100,000+ managers), based on my team’s engagement scores over…
I'm excited to share that I've been recognized by Workleap as a Top 10% Manager (out of 100,000+ managers), based on my team’s engagement scores over…
Liked by Graham Mueller
-
James Comey was the first — but he won't be the last. Donald Trump is coming for all of us. We have seen much debate over the merits and timing of a…
James Comey was the first — but he won't be the last. Donald Trump is coming for all of us. We have seen much debate over the merits and timing of a…
Liked by Graham Mueller
-
Why has self play been massively successful in two-player zero-sum (2p0s) games like Go/Poker/Starcraft, but hasn't led to similar success in LLM…
Why has self play been massively successful in two-player zero-sum (2p0s) games like Go/Poker/Starcraft, but hasn't led to similar success in LLM…
Liked by Graham Mueller
-
This is just wild. AI is about to reveal the deepest secrets of real intelligence. We know have a complete map of a fruit fly's brain: every signal…
This is just wild. AI is about to reveal the deepest secrets of real intelligence. We know have a complete map of a fruit fly's brain: every signal…
Liked by Graham Mueller
-
Excited to share work by my PhD student Yao Dou (in collaboration with Microsoft Research) on creating more realistic user simulators that help…
Excited to share work by my PhD student Yao Dou (in collaboration with Microsoft Research) on creating more realistic user simulators that help…
Liked by Graham Mueller
-
I am excited to start at Appgate today, joining Nitin Pillai's team (a fellow Microsoft alum) to develop ML/AI powered features for their Zero Trust…
I am excited to start at Appgate today, joining Nitin Pillai's team (a fellow Microsoft alum) to develop ML/AI powered features for their Zero Trust…
Liked by Graham Mueller
View Graham’s full profile
-
See who you know in common
-
Get introduced
-
Contact Graham directly
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentAdd new skills with these courses
View Graham’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
LinkedIn is better on the app
Don’t have the app? Get it in the Microsoft Store.
Open the app