Alert button
Picture for Chen Hajaj

Chen Hajaj

Alert button

CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution

Add code
Bookmark button
Alert button
Mar 17, 2024
Amir Lukach, Ran Dubin, Amit Dvir, Chen Hajaj

Figure 1 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Figure 2 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Figure 3 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Figure 4 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Viaarxiv icon

Open-Source Framework for Encrypted Internet and Malicious Traffic Classification

Add code
Bookmark button
Alert button
Jun 21, 2022
Ofek Bader, Adi Lichy, Amit Dvir, Ran Dubin, Chen Hajaj

Figure 1 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Figure 2 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Figure 3 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Figure 4 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Viaarxiv icon

When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification

Add code
Bookmark button
Alert button
Jun 16, 2022
Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj

Figure 1 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Figure 2 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Figure 3 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Figure 4 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Viaarxiv icon

MaMaDroid2.0 -- The Holes of Control Flow Graphs

Add code
Bookmark button
Alert button
Feb 28, 2022
Harel Berger, Chen Hajaj, Enrico Mariconti, Amit Dvir

Figure 1 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 2 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 3 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 4 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Viaarxiv icon

A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to PDF Malware Detection

Add code
Bookmark button
Alert button
Jun 13, 2018
Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Yevgeniy Vorobeychik

Figure 1 for A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to PDF Malware Detection
Figure 2 for A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to PDF Malware Detection
Figure 3 for A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to PDF Malware Detection
Figure 4 for A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to PDF Malware Detection
Viaarxiv icon