Deep learning for classification of malware system call sequences B Kolosnjaji, A Zarras, G Webster, C Eckert AI 2016: Advances in Artificial Intelligence: 29th Australasian Joint …, 2016 | 651 | 2016 |
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system TK Lengyel, S Maresca, BD Payne, GD Webster, S Vogl, A Kiayias Proceedings of the 30th annual computer security applications conference …, 2014 | 268 | 2014 |
Empowering convolutional networks for malware classification and analysis B Kolosnjaji, G Eraisha, G Webster, A Zarras, C Eckert 2017 International Joint Conference on Neural Networks (IJCNN), 3838-3845, 2017 | 118 | 2017 |
Adaptive semantics-aware malware classification B Kolosnjaji, A Zarras, T Lengyel, G Webster, C Eckert Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016 | 41 | 2016 |
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage GD Webster, B Kolosnjaji, C von Pentz, J Kirsch, ZD Hanif, A Zarras, ... Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017 | 34 | 2017 |
SKALD: a scalable architecture for feature extraction, multi-user analysis, and real-time information sharing GD Webster, ZD Hanif, ALP Ludwig, TK Lengyel, A Zarras, C Eckert Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016 | 17 | 2016 |
Sharing is caring: Collaborative analysis and real-time enquiry for security analytics GD Webster, RL Harris, ZD Hanif, BA Hembree, J Grossklags, C Eckert 2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018 | 11 | 2018 |
Pitfalls of virtual machine introspection on modern hardware T Lengyel, T Kittel, G Webster, J Torrey, C Eckert 1st Workshop on Malware Memory Forensics (MMF), 2014 | 8 | 2014 |
Internet-Scale File Analysis Z Hanif, TK Lengyel, GD Webster Black Hat USA, 2015 | 2 | 2015 |
Network inventory management and anomaly detection system H Xiao, G Webster, B Kolosnjaji, A Carney US Patent App. 17/945,711, 2024 | | 2024 |
From Bayesian Networks to Belief Propagation (based on book Probabilistic Graphical Models [1]) BKHXG Webster | | 2015 |
Kickoff: Anomaly Detection Challenges H Xiao, B Kolosnjaji, G Webster, B Weggenmann | | 2015 |