Machine learning and deep learning models are potential vectors for vari...
Machine learning has proven to be a useful tool for automated malware
de...
Effective and efficient malware detection is at the forefront of researc...
Many different machine learning and deep learning techniques have been
s...
We determine the accuracy with which machine learning and deep learning
...
Machine learning is becoming increasingly popular as a go-to approach fo...
Batch Normalization (BatchNorm) is a technique that improves the trainin...
Managing the threat posed by malware requires accurate detection and
cla...
A common yet potentially dangerous task is the act of crossing the stree...
When training a machine learning model, there is likely to be a tradeoff...
The anonymous nature of darknets is commonly exploited for illegal
activ...
Momentum is a popular technique for improving convergence rates during
g...
Spam can be defined as unsolicited bulk email. In an effort to evade
tex...
In this research, we compare malware detection techniques based on stati...
YouTube videos often include captivating descriptions and intriguing
thu...
Low grade endometrial stromal sarcoma (LGESS) is rare form of cancer,
ac...
Malware evolves over time and antivirus must adapt to such evolution. He...
Generative adversarial networks (GAN) are a class of powerful machine
le...
Keystroke dynamics can be used to analyze the way that users type by
mea...
In this paper, we consider malware classification using deep learning
te...
Research in the field of malware classification often relies on machine
...
The impact of social media on the modern world is difficult to overstate...
Malware detection is a critical aspect of information security. One
diff...
In this paper, we use K-means clustering to analyze various relationship...
In this paper, we consider ensemble classifiers, that is, machine learni...
Word embeddings are often used in natural language processing as a means...
As the name suggests, image spam is spam email that has been embedded in...
Discrete hidden Markov models (HMM) are often applied to malware detecti...
Signature and anomaly based techniques are the quintessential approaches...
Malware classification is an important and challenging problem in inform...
In this paper, we explore the effectiveness of dynamic analysis techniqu...