In addition to using signatures, antimalware products also detect malicious attacks by evaluating unknown files in an emulated environment, i.e. sandbox, prior to execution on a computer's native operating system. During emulation, a file cannot be scanned indefinitely, and antimalware engines often set the number of instructions to be executed based on a set of heuristics. These heuristics only make the decision of when to halt emulation using partial information leading to the execution of the file for either too many or too few instructions. Also this method is vulnerable if the attackers learn this set of heuristics. Recent research uses a deep reinforcement learning (DRL) model employing a Deep Q-Network (DQN) to learn when to halt the...
Machine learning is a subset of Artificial Intelligence which is utilised in a variety of different ...
In this paper, we are going to verify the possibility to create a ransomware simulation that will us...
We present TrojDRL, a tool for exploring and evaluating backdoor attacks on deep reinforcement lear...
Modern commercial antivirus systems increasingly rely on machine learning to keep up with the rampan...
Doctor of PhilosophyDepartment of Computer ScienceArslan MunirWilliam H. HsuSince the inception of D...
Current state-of-the-art research for tackling the problem of malware detection and classification i...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
Current state-of-the-art research for tackling the problem of malware detection and classification i...
Producción CientíficaThe application of new techniques to increase the performance of intrusion dete...
Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
Malware has become a more widespread problem alongside the rapid growth of technology. Malware is an...
Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability...
Malicious software (ransom ware) cyber attacks in frequency and severity, posing an increasingly ser...
Ransomware is malware that hijacks a victim's data using encryption and demands a ransom in exchange...
Machine learning is a subset of Artificial Intelligence which is utilised in a variety of different ...
In this paper, we are going to verify the possibility to create a ransomware simulation that will us...
We present TrojDRL, a tool for exploring and evaluating backdoor attacks on deep reinforcement lear...
Modern commercial antivirus systems increasingly rely on machine learning to keep up with the rampan...
Doctor of PhilosophyDepartment of Computer ScienceArslan MunirWilliam H. HsuSince the inception of D...
Current state-of-the-art research for tackling the problem of malware detection and classification i...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
Current state-of-the-art research for tackling the problem of malware detection and classification i...
Producción CientíficaThe application of new techniques to increase the performance of intrusion dete...
Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
Malware has become a more widespread problem alongside the rapid growth of technology. Malware is an...
Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability...
Malicious software (ransom ware) cyber attacks in frequency and severity, posing an increasingly ser...
Ransomware is malware that hijacks a victim's data using encryption and demands a ransom in exchange...
Machine learning is a subset of Artificial Intelligence which is utilised in a variety of different ...
In this paper, we are going to verify the possibility to create a ransomware simulation that will us...
We present TrojDRL, a tool for exploring and evaluating backdoor attacks on deep reinforcement lear...