arxiv papers - PSJoshi/Notes GitHub Wiki
- Automatic Investigation Framework for Android Malware Cyber-Infrastructures - https://arxiv.org/abs/1806.08893
- Are Free Android App Security Analysis Tools Effective in Detecting Known Vulnerabilities - https://arxiv.org/abs/1806.09059
- Net2Vec: Deep Learning for the Network - https://arxiv.org/pdf/1705.03881.pdf
- Eliminating experimental bias in malware classification - https://arxiv.org/abs/1807.07838
- Interactive Supercomputing on 40,000 Cores for Machine Learning and Data Analysis - https://arxiv.org/abs/1807.07814
- Mobile ultrasonic firewall - https://arxiv.org/pdf/1807.07617.pdf
- Leveraging ML for detection of ransomware - https://arxiv.org/pdf/1807.10440.pdf
- Performance evaluation of job schedulers on Hadoop YARN - https://arxiv.org/abs/1808.08289
- Big data landscape - https://arxiv.org/pdf/1808.08474.pdf
- Automated analysis of free installer programs on Internet - https://www.sciencedirect.com/science/article/pii/S0167404818302797
- Creating and managing fake documents programmatically - https://arxiv.org/pdf/1809.04648.pdf
- Effectiveness of attack detection in ICS environment - https://arxiv.org/pdf/1809.04786.pdf
- Deep learning methods in information security - https://arxiv.org/pdf/1809.04332.pdf
- Deep learning for time series classification - https://arxiv.org/abs/1809.04356
- Open Source Hardware-Software Platform for Rapid Research in LPWANs - https://arxiv.org/abs/1809.04143
- Designing a blockchain-based IoT infrastructure with Ethereum, Swarm and LoRa - https://arxiv.org/abs/1809.07655
- Spark based anomaly detection of port and network scan - https://arxiv.org/pdf/1806.11047.pdf
- Profiling of Industrial IoT time series - https://arxiv.org/pdf/1809.07500.pdf
- IPv6 dead or alive - https://arxiv.org/pdf/1809.07836.pdf
- Controller Hijacking Attacks on the Power-Grid with Enhanced Deep Learning - https://arxiv.org/pdf/1806.06496.pdf
- Design of a New Stream Cipher: PALS - https://arxiv.org/pdf/1807.01115.pdf
- Detection of malicious websites - https://arxiv.org/pdf/1802.06012.pdf
- Security monitoring of cyber space - https://arxiv.org/pdf/1608.01468.pdf
- Towards Automated Fingerprinting of IoT Traffic with Neural Networks - https://arxiv.org/abs/1909.00104
- Phishing Website Detection by Visual Whitelists - https://arxiv.org/abs/1909.00300
- HTMLPhish: Enabling Accurate Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis - https://arxiv.org/abs/1909.01135
- GrAALF:Supporting Graphical Analysis of Audit Logs for Forensics - https://arxiv.org/abs/1909.00902
- Automated command generation towards automatic recovery in ICT systems by Seq2Seq learning - https://arxiv.org/abs/2003.10784