Alert button
Picture for Hemant Rathore

Hemant Rathore

Alert button

Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review

Add code
Bookmark button
Alert button
Jun 06, 2022
Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

Viaarxiv icon

LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach

Add code
Bookmark button
Alert button
Sep 23, 2021
Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

Figure 1 for LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach
Figure 2 for LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach
Figure 3 for LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach
Figure 4 for LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach
Viaarxiv icon

ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator

Add code
Bookmark button
Alert button
Sep 23, 2021
Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

Figure 1 for ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator
Figure 2 for ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator
Figure 3 for ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator
Figure 4 for ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator
Viaarxiv icon

DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems

Add code
Bookmark button
Alert button
Sep 12, 2021
Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

Figure 1 for DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems
Figure 2 for DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems
Figure 3 for DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems
Figure 4 for DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems
Viaarxiv icon

Identification of Significant Permissions for Efficient Android Malware Detection

Add code
Bookmark button
Alert button
Feb 28, 2021
Hemant Rathore, Sanjay K. Sahay, Ritvik Rajvanshi, Mohit Sewak

Figure 1 for Identification of Significant Permissions for Efficient Android Malware Detection
Figure 2 for Identification of Significant Permissions for Efficient Android Malware Detection
Figure 3 for Identification of Significant Permissions for Efficient Android Malware Detection
Figure 4 for Identification of Significant Permissions for Efficient Android Malware Detection
Viaarxiv icon

Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering

Add code
Bookmark button
Alert button
Feb 28, 2021
Hemant Rathore, Sanjay K. Sahay, Shivin Thukral, Mohit Sewak

Figure 1 for Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering
Figure 2 for Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering
Figure 3 for Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering
Figure 4 for Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering
Viaarxiv icon

DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware

Add code
Bookmark button
Alert button
Feb 01, 2021
Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

Figure 1 for DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware
Figure 2 for DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware
Figure 3 for DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware
Figure 4 for DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware
Viaarxiv icon

Robust Android Malware Detection System against Adversarial Attacks using Q-Learning

Add code
Bookmark button
Alert button
Jan 27, 2021
Hemant Rathore, Sanjay K. Sahay, Piyush Nikam, Mohit Sewak

Figure 1 for Robust Android Malware Detection System against Adversarial Attacks using Q-Learning
Figure 2 for Robust Android Malware Detection System against Adversarial Attacks using Q-Learning
Figure 3 for Robust Android Malware Detection System against Adversarial Attacks using Q-Learning
Figure 4 for Robust Android Malware Detection System against Adversarial Attacks using Q-Learning
Viaarxiv icon

Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS

Add code
Bookmark button
Alert button
Dec 26, 2020
Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

Figure 1 for Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS
Figure 2 for Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS
Figure 3 for Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS
Figure 4 for Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS
Viaarxiv icon

DOOM: A Novel Adversarial-DRL-Based Op-Code Level Metamorphic Malware Obfuscator for the Enhancement of IDS

Add code
Bookmark button
Alert button
Oct 16, 2020
Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

Figure 1 for DOOM: A Novel Adversarial-DRL-Based Op-Code Level Metamorphic Malware Obfuscator for the Enhancement of IDS
Figure 2 for DOOM: A Novel Adversarial-DRL-Based Op-Code Level Metamorphic Malware Obfuscator for the Enhancement of IDS
Figure 3 for DOOM: A Novel Adversarial-DRL-Based Op-Code Level Metamorphic Malware Obfuscator for the Enhancement of IDS
Viaarxiv icon