[1]
|
A novel robust convolutional neural network for uniform resource locator classification from the view of cyber security
Concurrency and Computation: Practice and Experience,
2023
DOI:10.1002/cpe.7517
|
|
|
[2]
|
A novel robust convolutional neural network for uniform resource locator classification from the view of cyber security
Concurrency and Computation: Practice and Experience,
2023
DOI:10.1002/cpe.7517
|
|
|
[3]
|
Machine learning in cybersecurity: a comprehensive survey
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology,
2022
DOI:10.1177/1548512920951275
|
|
|
[4]
|
A novel robust convolutional neural network for uniform resource locator classification from the view of cyber security
Concurrency and Computation: Practice and Experience,
2022
DOI:10.1002/cpe.7517
|
|
|
[5]
|
Malware Analysis Using Artificial Intelligence and Deep Learning
2021
DOI:10.1007/978-3-030-62582-5_2
|
|
|
[6]
|
A Complete Study on Malware Types and Detecting Ransomware Using API Calls
2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO),
2021
DOI:10.1109/ICRITO51393.2021.9596085
|
|
|
[7]
|
Malware Detection: Issues and Challenges
Journal of Physics: Conference Series,
2021
DOI:10.1088/1742-6596/1807/1/012011
|
|
|
[8]
|
Stealthy Malware Detection Based on Deep Neural Network
Journal of Physics: Conference Series,
2020
DOI:10.1088/1742-6596/1437/1/012123
|
|
|
[9]
|
Detection of Anomalies in the Information Networks of Industrial Automation Systems Based on Artificial Immune Detectors
2019 International Russian Automation Conference (RusAutoCon),
2019
DOI:10.1109/RUSAUTOCON.2019.8867593
|
|
|
[10]
|
DDoS Detection on Network Protocol Using Cosine Similarity and N-Gram+ Method
2018 International Conference on Sustainable Information Engineering and Technology (SIET),
2018
DOI:10.1109/SIET.2018.8693215
|
|
|
[11]
|
A Two-stage Malware Detection Architecture Inspired by Human Immune System
2018 Cyber Resilience Conference (CRC),
2018
DOI:10.1109/CR.2018.8626867
|
|
|
[12]
|
Proposing an efficient approach for malware clustering
2017 Artificial Intelligence and Signal Processing Conference (AISP),
2017
DOI:10.1109/AISP.2017.8324094
|
|
|
[13]
|
Deep learning for malicious flow detection
2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC),
2017
DOI:10.1109/PIMRC.2017.8292316
|
|
|
[14]
|
Malware detection vectors and analysis techniques: A brief survey
2016 International Conference on Accessibility to Digital World (ICADW),
2016
DOI:10.1109/ICADW.2016.7942517
|
|
|