DikeDataset / others /citations.bib
cycloevan's picture
Upload 10456 files
5f52c9d verified
@InProceedings{10.1007/978-3-031-35644-5_20,
author="Kumar, Rajesh
and Talwar, Rachit
and Sharma, Manik
and Kumari, Suchi
and Goel, Shivani
and Malhotra, Kanika
and Ahmed, Faiz",
editor="Garg, Deepak
and Narayana, V. A.
and Suganthan, P. N.
and Anguera, Jaume
and Koppula, Vijaya Kumar
and Gupta, Suneet Kumar",
title="Malware Detection in URL Using Machine Learning Approach",
booktitle="Advanced Computing",
year="2023",
publisher="Springer Nature Switzerland",
address="Cham",
pages="251--263",
isbn="978-3-031-35644-5"
}
@article{saha2023adversarial,
title={Adversarial Robustness of Learning-based Static Malware Classifiers},
author={Saha, Shoumik and Wang, Wenxiao and Kaya, Yigitcan and Feizi, Soheil},
journal={arXiv preprint arXiv:2303.13372},
year={2023}
}
@article{okpongete2022intelligent,
title={Intelligent Endpoint-based Ransomware Detection Framework},
author={Okpongete, Faith},
year={2022}
}
@article{장재석2022autoencoder,
title={AutoEncoder 기반 역난독화 사전학습 및 전이학습을 통한 악성코드 탐지 방법론},
author={장재석 and 구본재 and 엄성준 and 한지형},
journal={한국정보처리학회 학술대회논문집},
volume={29},
number={2},
pages={905--907},
year={2022},
publisher={한국정보처리학회}
}
@InProceedings{10.1007/978-3-031-09484-2_3,
author="Meloni, Francesco
and Sanna, Alessandro
and Maiorca, Davide
and Giacinto, Giorgio",
editor="Cavallaro, Lorenzo
and Gruss, Daniel
and Pellegrino, Giancarlo
and Giacinto, Giorgio",
title="Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware",
booktitle="Detection of Intrusions and Malware, and Vulnerability Assessment",
year="2022",
publisher="Springer International Publishing",
address="Cham",
pages="42--52",
isbn="978-3-031-09484-2"
}
@article{gao2022malware,
title={Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network},
author={Gao, Yun and Hasegawa, Hirokazu and Yamaguchi, Yukiko and Shimada, Hajime},
journal={IEEE Access},
volume={10},
pages={111830--111841},
year={2022},
publisher={IEEE}
}
@article{asghar2022sok,
title={SoK: Use of Cryptography in Malware Obfuscation},
author={Asghar, Hassan Jameel and Zhao, Benjamin Zi Hao and Ikram, Muhammad and Nguyen, Giang and Kaafar, Dali and Lamont, Sean and Coscia, Daniel},
journal={arXiv preprint arXiv:2212.04008},
year={2022}
}
@article{wei2021toward,
title={Toward identifying APT malware through API system calls},
author={Wei, Chaoxian and Li, Qiang and Guo, Dong and Meng, Xiangyu},
journal={Security and Communication Networks},
volume={2021},
pages={1--14},
year={2021},
publisher={Hindawi Limited}
}
@inproceedings{frederick2022corpus,
title={A Corpus of Encoded Malware Byte Information as Images for Efficient Classification},
author={Frederick, Ryan and Shapiro, Joseph and Calix, Ricardo A},
booktitle={2022 16th International Conference on Signal-Image Technology \& Internet-Based Systems (SITIS)},
pages={32--36},
year={2022},
organization={IEEE}
}
@inproceedings{el2022comparison,
title={Comparison of Feature Extraction and Classification Techniques of PE Malware},
author={El Neel, Leena and Copiaco, Abigail and Obaid, Walid and Mukhtar, Husameldin},
booktitle={2022 5th International Conference on Signal Processing and Information Security (ICSPIS)},
pages={26--31},
year={2022},
organization={IEEE}
}
@inproceedings{sharma2022deep,
title={Deep Learning based Residual Attention Network for Malware Detection in CyberSecurity},
author={Sharma, Ruchi and Deshmukh, Shreyas and Mannava, Amartya and Birla, Pulkit},
booktitle={2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS)},
pages={851--856},
year={2022},
organization={IEEE}
}
@article{al2023ensemble,
title={An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection},
author={Al-Andoli, Mohammed Nasser and Tan, Shing Chiang and Sim, Kok Swee and Goh, Pey Yun and Lim, Chee Peng},
journal={Journal of Intelligent \& Fuzzy Systems},
number={Preprint},
pages={1--17},
year={2023},
publisher={IOS Press}
}
@phdthesis{saracino2023machine,
title={Machine Learning for malware characterization and identification},
author={Saracino, Marco},
year={2023},
school={Politecnico di Torino}
}
@article{abdelwahed2023detecting,
title={Detecting Malware Activities with MalpMiner: A Dynamic Analysis Approach},
author={Abdelwahed, Mustafa F and Kamal, Mustafa M and Sayed, Samir G},
journal={IEEE Access},
year={2023},
publisher={IEEE}
}
@article{maniriho2022evaluation,
title={Evaluation and survey of state of the art malware detection and classification techniques: Analysis and recommendation},
author={Maniriho, Pascal and Mahmood, Abdun and Chowdhury, Mohammad Jabed Morshed},
journal={Available at SSRN 4197678},
year={2022}
}
@phdthesis{sindoni2023toward,
title={Toward a methodology for malware analysis and characterization for Machine Learning application},
author={Sindoni, Andrea},
year={2023},
school={Politecnico di Torino}
}
@article{mouro2022tecnicas,
title={T{\'e}cnicas de aprendizaje m{\'a}quina para an{\'a}lisis de malware},
author={Mouro Gonz{\'a}lez, Samuel},
year={2022}
}
@inproceedings{shinde2022knowledge,
title={Knowledge Graph creation on Windows malwares and completion using knowledge graph embedding},
author={Shinde, Omkar and Khobragade, Anish},
booktitle={2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)},
pages={1980--1984},
year={2022},
organization={IEEE}
}
@article{sanz2022uso,
title={Uso de algoritmos de machine learning para la detecci{\'o}n de archivos malware},
author={Sanz Garc{\'\i}a, Sergio},
year={2022},
publisher={Universidad Nacional de Educaci{\'o}n a Distancia (Espa{\~n}a). Escuela T{\'e}cnica~…}
}