[1]
|
MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches
IEEE Transactions on Information Forensics and Security,
2024
DOI:10.1109/TIFS.2023.3333567
|
|
|
[2]
|
PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection
IEEE Transactions on Emerging Topics in Computing,
2023
DOI:10.1109/TETC.2022.3170544
|
|
|
[3]
|
PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection
IEEE Transactions on Emerging Topics in Computing,
2023
DOI:10.1109/TETC.2022.3170544
|
|
|
[4]
|
Security, Trust and Privacy Models, and Architectures in IoT Environments
Internet of Things,
2023
DOI:10.1007/978-3-031-21940-5_6
|
|
|
[5]
|
Simulating Cyber Attacks and Designing Malware using Python
2023 10th International Conference on Signal Processing and Integrated Networks (SPIN),
2023
DOI:10.1109/SPIN57001.2023.10116554
|
|
|
[6]
|
Towards a New Cyberdefense Generation: Proposition of an Intelligent
Cybersecurity Framework for Malware Attacks
Recent Advances in Computer Science and Communications,
2022
DOI:10.2174/2666255813999201117093512
|
|
|
[7]
|
Malware Classification based on a Light-weight Architecture of CNN: MalShuffleNet
2022 3rd International Conference on Computer Vision, Image and Deep Learning & International Conference on Computer Engineering and Applications (CVIDL & ICCEA),
2022
DOI:10.1109/CVIDLICCEA56201.2022.9824719
|
|
|
[8]
|
Malware Variants Detection Model Based on MFF–HDBA
Applied Sciences,
2022
DOI:10.3390/app12199593
|
|
|
[9]
|
Intelligent Data Engineering and Automated Learning – IDEAL 2022
Lecture Notes in Computer Science,
2022
DOI:10.1007/978-3-031-21753-1_29
|
|
|
[10]
|
Classification of ransomware using different types of neural networks
Scientific Reports,
2022
DOI:10.1038/s41598-022-08504-6
|
|
|
[11]
|
Efficient Malware Classification by Binary Sequences with One-Dimensional Convolutional Neural Networks
Mathematics,
2022
DOI:10.3390/math10040608
|
|
|
[12]
|
Lightweight Convolution Neural Network for Image-Based Malware Classification on Embedded Systems
2021 International Seminar on Machine Learning, Optimization, and Data Science (ISMODE),
2022
DOI:10.1109/ISMODE53584.2022.9743111
|
|
|
[13]
|
Artificial Intelligence and Sustainable Computing
Algorithms for Intelligent Systems,
2022
DOI:10.1007/978-981-16-1220-6_39
|
|
|
[14]
|
Image Classification for Egg Incubator using Transfer Learning of VGG16 and VGG19
2021 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT),
2021
DOI:10.1109/COMNETSAT53002.2021.9530826
|
|
|
[15]
|
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020)
Advances in Intelligent Systems and Computing,
2021
DOI:10.1007/978-3-030-73689-7_75
|
|
|
[16]
|
Artificial Intelligence Techniques for Advanced Computing Applications
Lecture Notes in Networks and Systems,
2021
DOI:10.1007/978-981-15-5329-5_19
|
|
|
[17]
|
Comparative Study of Malware Detection Techniques for Industrial Control Systems
2021 14th International Conference on Security of Information and Networks (SIN),
2021
DOI:10.1109/SIN54109.2021.9699167
|
|
|
[18]
|
Internet of Things and Connected Technologies
Advances in Intelligent Systems and Computing,
2021
DOI:10.1007/978-3-030-76736-5_36
|
|
|
[19]
|
Enhancing Image-Based Malware Classification Using Semi-Supervised Learning
2021 3rd Novel Intelligent and Leading Emerging Sciences Conference (NILES),
2021
DOI:10.1109/NILES53778.2021.9600511
|
|
|
[20]
|
Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs
Computational Intelligence and Neuroscience,
2021
DOI:10.1155/2021/1070586
|
|
|
[21]
|
Malware Classification Approaches Using Machine Learning Techniques: A Review
2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT),
2021
DOI:10.1109/ICEECCOT52851.2021.9708041
|
|
|
[22]
|
An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems
IEEE Transactions on Emerging Topics in Computational Intelligence,
2020
DOI:10.1109/TETCI.2019.2910243
|
|
|
[23]
|
Research Anthology on Artificial Intelligence Applications in Security
2020
DOI:10.4018/978-1-7998-7705-9.ch050
|
|
|
[24]
|
A Survey on Malware Detection and Classification
Journal of Applied Security Research,
2020
DOI:10.1080/19361610.2020.1796162
|
|
|
[25]
|
Security and Privacy in Communication Networks
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
2020
DOI:10.1007/978-3-030-63095-9_26
|
|
|
[26]
|
Malware Classification Framework using Convolutional Neural Network
2020 International Conference on Cyber Warfare and Security (ICCWS),
2020
DOI:10.1109/ICCWS48432.2020.9292384
|
|
|
[27]
|
An improved two-hidden-layer extreme learning machine for malware hunting
Computers & Security,
2020
DOI:10.1016/j.cose.2019.101655
|
|
|
[28]
|
The Image Game: Exploit Kit Detection Based on Recursive Convolutional Neural Networks
IEEE Access,
2020
DOI:10.1109/ACCESS.2020.2967746
|
|
|
[29]
|
Customized Convolutional Neural Networks with K-Nearest Neighbor Classification System for Malware Categorization
Journal of Applied Security Research,
2020
DOI:10.1080/19361610.2020.1718990
|
|
|
[30]
|
Soft Computing: Theories and Applications
Advances in Intelligent Systems and Computing,
2020
DOI:10.1007/978-981-15-4032-5_62
|
|
|
[31]
|
Generation & Evaluation of Adversarial Examples for Malware Obfuscation
2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA),
2019
DOI:10.1109/ICMLA.2019.00210
|
|
|
[32]
|
Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems
Advances in Digital Crime, Forensics, and Cyber Terrorism,
2019
DOI:10.4018/978-1-5225-8241-0.ch011
|
|
|
[33]
|
Cybersecurity and Secure Information Systems
Advanced Sciences and Technologies for Security Applications,
2019
DOI:10.1007/978-3-030-16837-7_12
|
|
|
[34]
|
An Xception Convolutional Neural Network for Malware Classification with Transfer Learning
2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS),
2019
DOI:10.1109/NTMS.2019.8763852
|
|
|
[35]
|
Information Security
Lecture Notes in Computer Science,
2019
DOI:10.1007/978-3-030-30215-3_19
|
|
|
[36]
|
Machine learning application for malwares classification using visualization technique
Proceedings of the 4th International Conference on Smart City Applications,
2019
DOI:10.1145/3368756.3369098
|
|
|
[37]
|
Experiential Learning: Case Study-Based Portable Hands-on Regression Labware for Cyber Fraud Prediction
2019 IEEE International Conference on Big Data (Big Data),
2019
DOI:10.1109/BigData47090.2019.9005713
|
|
|
[38]
|
Machine learning application for malwares classification using visualization technique
Proceedings of the 4th International Conference on Smart City Applications,
2019
DOI:10.1145/3368756.3369098
|
|
|
[39]
|
Machine learning application for malwares classification using visualization technique
Proceedings of the 4th International Conference on Smart City Applications,
2019
DOI:10.1145/3368756.3369098
|
|
|
[40]
|
Algorithmic Financial Trading with Deep Convolutional Neural Networks: Time Series to Image Conversion Approach
Applied Soft Computing,
2018
DOI:10.1016/j.asoc.2018.04.024
|
|
|
[41]
|
Malware Classification with Markov Transition Field Encoded Images
2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC),
2018
DOI:10.1109/IMCCC.2018.00008
|
|
|