暂无分享,去创建一个
[1] K. P. Soman,et al. Distributed representation using target classes: Bag of tricks for security and privacy analytics Amrita-NLP@IWSPA-2018 , 2018 .
[2] K. P. Soman,et al. Evaluating deep learning approaches to characterize and classify the DGAs at scale , 2018, J. Intell. Fuzzy Syst..
[3] Yusuke Doi,et al. Classification of URL bitstreams using bag of bytes , 2018, 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN).
[4] K. P. Soman,et al. Detecting Android malware using Long Short-term Memory (LSTM) , 2018, J. Intell. Fuzzy Syst..
[5] Razvan Pascanu,et al. Malware classification with recurrent networks , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[6] Prabaharan Poornachandran,et al. Scalable Framework for Cyber Threat Situational Awareness Based on Domain Name Systems Data Analysis , 2018 .
[7] Ralf C. Staudemeyer,et al. Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data , 2013, SAICSIT '13.
[8] K. P. Soman,et al. A machine learning approach towards phishing email detection CEN-Security@IWSPA 2018 , 2018 .
[9] Arun Kumar Sangaiah,et al. Android malware detection based on system call sequences and LSTM , 2019, Multimedia Tools and Applications.
[10] Jian Zhang,et al. Classification of Android apps and malware using deep neural networks , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[11] Zhenlong Yuan,et al. DroidDetector: Android Malware Characterization and Detection Using Deep Learning , 2016 .
[12] Prabaharan Poornachandran,et al. ScaleNet: Scalable and Hybrid Frameworkfor Cyber Threat Situational AwarenessBased on DNS, URL, and Email Data Analysis , 2019, J. Cyber Secur. Mobil..
[13] K. P. Soman,et al. Deep android malware detection and classification , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[14] Pierre Lison,et al. Automatic Detection of Malware-Generated Domains with Recurrent Neural Models , 2017, ArXiv.
[15] K. P. Soman,et al. Detecting malicious domain names using deep learning approaches at scale , 2018, J. Intell. Fuzzy Syst..
[16] R. Vinayakumar,et al. DeepMalNet: Evaluating shallow and deep networks for static PE malware detection , 2018, ICT Express.
[17] K. P. Soman,et al. DeepImageSpam: Deep Learning based Image Spam Detection , 2018, ArXiv.
[18] Elmar Gerhards-Padilla,et al. Automatic Extraction of Domain Name Generation Algorithms from Current Malware , 2012 .
[19] K. P. Soman,et al. Evaluating shallow and deep networks for ransomware detection and classification , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[20] Mahmood Yousefi-Azar,et al. Autoencoder-based feature learning for cyber security applications , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[21] Martine De Cock,et al. Inline DGA Detection with Deep Networks , 2017, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).
[22] K. P. Soman,et al. Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[23] K. P. Soman,et al. Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[24] Rakesh M. Verma. Security Analytics: Adapting Data Science for Security Challenges , 2018, IWSPA@CODASPY.
[25] Jack W. Stokes,et al. Large-scale malware classification using random projections and neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[26] Jack W. Stokes,et al. Malware classification with LSTM and GRU language models and a character-level CNN , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[27] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[28] K. P. Soman,et al. Deep Learning for Network Flow Analysis and Malware Classification , 2017, SSCC.
[29] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[30] K. P. Soman,et al. Applying deep learning approaches for network traffic prediction , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[31] Prabaharan Poornachandran,et al. Deep learning LSTM based ransomware detection , 2017, 2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE).
[32] Konstantin Berlin,et al. Deep neural network based malware detection using two dimensional binary program features , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).
[33] Martine De Cock,et al. Character Level based Detection of DGA Domain Names , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).
[34] K. P. Soman,et al. Evaluating effectiveness of shallow and deep networks to intrusion detection system , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[35] Eric Schulte,et al. Using recurrent neural networks for decompilation , 2018, 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER).
[36] K. P. Soman,et al. Evaluating shallow and deep networks for secure shell (ssh)traffic analysis , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[37] R Vinayakumar,et al. Comparative Study of the Detection of Malicious URLs Using Shallow and Deep Networks , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[38] Hyrum S. Anderson,et al. Predicting Domain Generation Algorithms with Long Short-Term Memory Networks , 2016, ArXiv.
[39] Luis F. T. Moraes,et al. Anti-Phishing Pilot at ACM IWSPA 2018 Evaluating Performance with New Metrics for Unbalanced Datasets , 2018 .
[40] Zhenkai Liang,et al. Neural Nets Can Learn Function Type Signatures From Binaries , 2017, USENIX Security Symposium.
[41] K. P. Soman,et al. DeepAnti-PhishNet: Applying deep neural networks for phishing email detection CEN-AISecurity@IWSPA-2018 , 2018 .
[42] Cheng-Chew Lim,et al. Looking deeper: Using deep learning to identify internet communications traffic , 2017 .
[43] Zeng Feng,et al. Classification for DGA-Based Malicious Domain Names with Deep Learning Architectures , 2017 .
[44] K. P. Soman,et al. Evaluating deep learning approaches to characterize and classify malicious URL's , 2018, J. Intell. Fuzzy Syst..
[45] Prabaharan Poornachandran,et al. Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[46] Wenyi Huang,et al. MtNet: A Multi-Task Neural Network for Dynamic Malware Classification , 2016, DIMVA.
[47] P SomanK.,et al. A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities , 2018, ArXiv.
[48] Dawn Xiaodong Song,et al. Recognizing Functions in Binaries with Neural Networks , 2015, USENIX Security Symposium.
[49] K. P. Soman,et al. Long short-term memory based operation log anomaly detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[50] Yunheung Paek,et al. LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems , 2016, ArXiv.