Alert button
Picture for Martin Jureček

Martin Jureček

Alert button

A Comparison of Adversarial Learning Techniques for Malware Detection

Add code
Bookmark button
Alert button
Aug 19, 2023
Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp

Figure 1 for A Comparison of Adversarial Learning Techniques for Malware Detection
Figure 2 for A Comparison of Adversarial Learning Techniques for Malware Detection
Figure 3 for A Comparison of Adversarial Learning Techniques for Malware Detection
Figure 4 for A Comparison of Adversarial Learning Techniques for Malware Detection
Viaarxiv icon

Keystroke Dynamics for User Identification

Add code
Bookmark button
Alert button
Jul 07, 2023
Atharva Sharma, Martin Jureček, Mark Stamp

Figure 1 for Keystroke Dynamics for User Identification
Figure 2 for Keystroke Dynamics for User Identification
Figure 3 for Keystroke Dynamics for User Identification
Figure 4 for Keystroke Dynamics for User Identification
Viaarxiv icon

Creating Valid Adversarial Examples of Malware

Add code
Bookmark button
Alert button
Jun 23, 2023
Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia

Viaarxiv icon

Classification and Online Clustering of Zero-Day Malware

Add code
Bookmark button
Alert button
May 01, 2023
Olha Jurečková, Martin Jureček, Róbert Lórencz

Figure 1 for Classification and Online Clustering of Zero-Day Malware
Figure 2 for Classification and Online Clustering of Zero-Day Malware
Figure 3 for Classification and Online Clustering of Zero-Day Malware
Figure 4 for Classification and Online Clustering of Zero-Day Malware
Viaarxiv icon

Combining Generators of Adversarial Malware Examples to Increase Evasion Rate

Add code
Bookmark button
Alert button
Apr 14, 2023
Matouš Kozák, Martin Jureček

Figure 1 for Combining Generators of Adversarial Malware Examples to Increase Evasion Rate
Figure 2 for Combining Generators of Adversarial Malware Examples to Increase Evasion Rate
Figure 3 for Combining Generators of Adversarial Malware Examples to Increase Evasion Rate
Figure 4 for Combining Generators of Adversarial Malware Examples to Increase Evasion Rate
Viaarxiv icon

Parallel Instance Filtering for Malware Detection

Add code
Bookmark button
Alert button
Jun 28, 2022
Martin Jureček, Olha Jurečková

Figure 1 for Parallel Instance Filtering for Malware Detection
Figure 2 for Parallel Instance Filtering for Malware Detection
Figure 3 for Parallel Instance Filtering for Malware Detection
Figure 4 for Parallel Instance Filtering for Malware Detection
Viaarxiv icon