A comparison of static, dynamic, and hybrid analysis for malware detection A Damodaran, FD Troia, CA Visaggio, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 13, 1-12, 2017 | 513 | 2017 |
Transfer learning for image-based malware classification N Bhodia, P Prajapati, F Di Troia, M Stamp arXiv preprint arXiv:1903.11551, 2019 | 122 | 2019 |
Detecting malware evolution using support vector machines M Wadkar, F Di Troia, M Stamp Expert Systems with Applications 143, 113022, 2020 | 99 | 2020 |
Deep Learning versus Gist Descriptors for Image-based Malware Classification. S Yajamanam, VRS Selvin, F Di Troia, M Stamp Icissp, 553-561, 2018 | 99 | 2018 |
Support vector machines and malware detection T Singh, F Di Troia, VA Corrado, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 12, 203-212, 2016 | 84 | 2016 |
Clustering for malware classification S Pai, FD Troia, CA Visaggio, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 13, 95-107, 2017 | 81 | 2017 |
Feature analysis of encrypted malicious traffic AS Shekhawat, F Di Troia, M Stamp Expert Systems with Applications 125, 130-141, 2019 | 79 | 2019 |
Static and dynamic analysis of android malware A Kapratwar, F Di Troia, M Stamp International Workshop on FORmal methods for Security Engineering 2, 653-662, 2017 | 62 | 2017 |
Malware detection using dynamic birthmarks S Vemparala, F Di Troia, VA Corrado, TH Austin, M Stamo Proceedings of the 2016 ACM on international workshop on security and …, 2016 | 54 | 2016 |
Clustering versus SVM for malware detection U Narra, FD Troia, VA Corrado, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 12, 213-224, 2016 | 43 | 2016 |
Convolutional neural networks for image spam detection T Sharmin, F Di Troia, K Potika, M Stamp Information Security Journal: A Global Perspective 29 (3), 103-117, 2020 | 31 | 2020 |
Malware classification with word2vec, hmm2vec, bert, and elmo AS Kale, V Pandya, F Di Troia, M Stamp Journal of Computer Virology and Hacking Techniques 19 (1), 1-16, 2023 | 29 | 2023 |
Support vector machines for image spam analysis A Chavda, K Potika, F Di Troia, M Stamp | 27 | 2018 |
An analysis of Android adware S Suresh, F Di Troia, K Potika, M Stamp Journal of Computer Virology and Hacking Techniques 15, 147-160, 2019 | 23 | 2019 |
Hidden Markov models with random restarts versus boosting for malware detection A Raghavan, F Di Troia, M Stamp Journal of Computer Virology and Hacking Techniques 15, 97-107, 2019 | 23 | 2019 |
Multifamily malware models S Basole, F Di Troia, M Stamp Journal of Computer Virology and Hacking Techniques 16, 79-92, 2020 | 22 | 2020 |
A comparative analysis of android malware N Chavan, F Di Troia, M Stamp arXiv preprint arXiv:1904.00735, 2019 | 22 | 2019 |
Classic cryptanalysis using hidden Markov models R Vobbilisetty, F Di Troia, RM Low, CA Visaggio, M Stamp Cryptologia 41 (1), 1-28, 2017 | 22 | 2017 |
Malware classification using long short-term memory models D Dang, F Di Troia, M Stamp arXiv preprint arXiv:2103.02746, 2021 | 21 | 2021 |
Generative adversarial networks and image-based malware classification H Nguyen, F Di Troia, G Ishigaki, M Stamp Journal of Computer Virology and Hacking Techniques 19 (4), 579-595, 2023 | 17 | 2023 |