Your selections:
A novel machine learning approach for detecting first-time-appeared malware
- Shaukat, Kamran, Luo, Suhuai, Varadharajan, Vijay
Pattern recognition and machine learning techniques for cyber security
A survey on machine learning techniques for cyber security in the last decade
- Shaukat, Kamran, Luo, Suhuai, Varadharajan, Vijay, Hameed, Ibrahim A., Xu, Min
A novel malware for subversion of self-protection in anti-virus
- Min, Byungho, Varadharajan, Vijay
Modeling and analysis of RRC-based signalling storms in 3G networks
- Gorbil, Gokce, Abdelrahman, Omer H., Pavloski, Mihajlo, Gelenbe, Erol
A simple and novel technique for counteracting exploit kits
- Min, Byungho, Varadharajan, Vijay
Design and analysis of a sophisticated malware attach against smart grid
- Min, Byungho, Varadharajan, Vijay
Design and evaluation of feature distributed malware attacks against the Internet of Things (IoT)
- Min, Byungho, Varadharajan, Vijay
Secure dynamic software loading and execution using cross component verification
- Min, Byungho, Varadharajan, Vijay
Antivirus security: naked during updates
- Min, Byungho, Varadharajan, Vijay, Tapakula , Udaya, Hitchens, Michael
Counteracting security attacks in virtual machines in the cloud using property based attestation
- Varadharajan, Vijay, Tupakula, Udaya
Are you sure you would like to clear your session, including search history and login status?