Malicious code detection in android: the role of sequence characteristics and disassembling methods Authors: Pinar G. Balikcioglu, Melih Sirlanci, Ozge A. Kucuk, Bulut Ulukapi, Ramazan K. Turkmen, Cengiz Acarturk | Published: 2023-12-02 LSTM Model Performance EvaluationWatermarkingMalware Classification 2023.12.02 2025.05.28 Literature Database
MalDicom: A Memory Forensic Framework for Detecting Malicious Payload in DICOM Files Authors: Ayushi Mishra, Priyanka Bagade | Published: 2023-12-01 | Updated: 2023-12-08 WatermarkingMalware ClassificationWatermarking Settings for Medical Data 2023.12.01 2025.05.28 Literature Database
MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers Authors: Robert J. Joyce, Edward Raff, Charles Nicholas, James Holt | Published: 2023-10-18 Dataset GenerationToken Processing and CollectionMalware Classification 2023.10.18 2025.05.28 Literature Database
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability Authors: Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola | Published: 2023-06-27 Malware ClassificationAdversarial ExampleAdversarial Attack Methods 2023.06.27 2025.05.28 Literature Database
[Re] Double Sampling Randomized Smoothing Authors: Aryan Gupta, Sarthak Gupta, Abhay Kumar, Harsh Dugar | Published: 2023-06-27 Malware ClassificationMalware Detection MethodRobustness Evaluation 2023.06.27 2025.05.28 Literature Database
Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods Authors: Yuanyuan Wei, Julian Jang-Jaccard, Amardeep Singh, Fariza Sabrina, Seyit Camtepe | Published: 2023-06-27 XAI (Explainable AI)Network Threat DetectionMalware Classification 2023.06.27 2025.05.28 Literature Database
Steganographic Capacity of Deep Learning Models Authors: Lei Zhang, Dong Li, Olha Jurečková, Mark Stamp | Published: 2023-06-25 Data ObfuscationMalware ClassificationInformation Hiding Techniques 2023.06.25 2025.05.28 Literature Database
Federated Learning Approach for Distributed Ransomware Analysis Authors: Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno | Published: 2023-06-25 Malware ClassificationMalware Detection MethodFederated Learning 2023.06.25 2025.05.28 Literature Database
On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions Authors: Reza Fayyazi, Shanchieh Jay Yang | Published: 2023-06-24 | Updated: 2023-08-22 Prompt InjectionMalware ClassificationNatural Language Processing 2023.06.24 2025.05.28 Literature Database
Creating Valid Adversarial Examples of Malware Authors: Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia | Published: 2023-06-23 Malware ClassificationMalware Detection MethodAdversarial attack 2023.06.23 2025.05.28 Literature Database