Alert button
Picture for Mark Stamp

Mark Stamp

Alert button

Feature Analysis of Encrypted Malicious Traffic

Add code
Bookmark button
Alert button
Dec 06, 2023
Anish Singh Shekhawat, Fabio Di Troia, Mark Stamp

Viaarxiv icon

Social Media Bot Detection using Dropout-GAN

Add code
Bookmark button
Alert button
Nov 09, 2023
Anant Shukla, Martin Jurecek, Mark Stamp

Figure 1 for Social Media Bot Detection using Dropout-GAN
Figure 2 for Social Media Bot Detection using Dropout-GAN
Figure 3 for Social Media Bot Detection using Dropout-GAN
Figure 4 for Social Media Bot Detection using Dropout-GAN
Viaarxiv icon

On the Steganographic Capacity of Selected Learning Models

Add code
Bookmark button
Alert button
Aug 29, 2023
Rishit Agrawal, Kelvin Jou, Tanush Obili, Daksh Parikh, Samarth Prajapati, Yash Seth, Charan Sridhar, Nathan Zhang, Mark Stamp

Figure 1 for On the Steganographic Capacity of Selected Learning Models
Figure 2 for On the Steganographic Capacity of Selected Learning Models
Figure 3 for On the Steganographic Capacity of Selected Learning Models
Figure 4 for On the Steganographic Capacity of Selected Learning Models
Viaarxiv icon

A Comparison of Adversarial Learning Techniques for Malware Detection

Add code
Bookmark button
Alert button
Aug 19, 2023
Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp

Figure 1 for A Comparison of Adversarial Learning Techniques for Malware Detection
Figure 2 for A Comparison of Adversarial Learning Techniques for Malware Detection
Figure 3 for A Comparison of Adversarial Learning Techniques for Malware Detection
Figure 4 for A Comparison of Adversarial Learning Techniques for Malware Detection
Viaarxiv icon

Hidden Markov Models with Random Restarts vs Boosting for Malware Detection

Add code
Bookmark button
Alert button
Jul 17, 2023
Aditya Raghavan, Fabio Di Troia, Mark Stamp

Viaarxiv icon

A Natural Language Processing Approach to Malware Classification

Add code
Bookmark button
Alert button
Jul 07, 2023
Ritik Mehta, Olha Jurečková, Mark Stamp

Figure 1 for A Natural Language Processing Approach to Malware Classification
Figure 2 for A Natural Language Processing Approach to Malware Classification
Figure 3 for A Natural Language Processing Approach to Malware Classification
Figure 4 for A Natural Language Processing Approach to Malware Classification
Viaarxiv icon

Keystroke Dynamics for User Identification

Add code
Bookmark button
Alert button
Jul 07, 2023
Atharva Sharma, Martin Jureček, Mark Stamp

Figure 1 for Keystroke Dynamics for User Identification
Figure 2 for Keystroke Dynamics for User Identification
Figure 3 for Keystroke Dynamics for User Identification
Figure 4 for Keystroke Dynamics for User Identification
Viaarxiv icon

Classifying World War II Era Ciphers with Machine Learning

Add code
Bookmark button
Alert button
Jul 02, 2023
Brooke Dalton, Mark Stamp

Figure 1 for Classifying World War II Era Ciphers with Machine Learning
Figure 2 for Classifying World War II Era Ciphers with Machine Learning
Figure 3 for Classifying World War II Era Ciphers with Machine Learning
Figure 4 for Classifying World War II Era Ciphers with Machine Learning
Viaarxiv icon

Steganographic Capacity of Deep Learning Models

Add code
Bookmark button
Alert button
Jun 25, 2023
Lei Zhang, Dong Li, Olha Jurečková, Mark Stamp

Figure 1 for Steganographic Capacity of Deep Learning Models
Figure 2 for Steganographic Capacity of Deep Learning Models
Figure 3 for Steganographic Capacity of Deep Learning Models
Figure 4 for Steganographic Capacity of Deep Learning Models
Viaarxiv icon

Creating Valid Adversarial Examples of Malware

Add code
Bookmark button
Alert button
Jun 23, 2023
Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia

Viaarxiv icon