Alert button
Picture for Richard Zak

Richard Zak

Alert button

Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection

Add code
Bookmark button
Alert button
Dec 17, 2020
Edward Raff, William Fleshman, Richard Zak, Hyrum S. Anderson, Bobby Filar, Mark McLean

Figure 1 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Figure 2 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Figure 3 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Figure 4 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Viaarxiv icon

Automatic Yara Rule Generation Using Biclustering

Add code
Bookmark button
Alert button
Sep 06, 2020
Edward Raff, Richard Zak, Gary Lopez Munoz, William Fleming, Hyrum S. Anderson, Bobby Filar, Charles Nicholas, James Holt

Figure 1 for Automatic Yara Rule Generation Using Biclustering
Figure 2 for Automatic Yara Rule Generation Using Biclustering
Figure 3 for Automatic Yara Rule Generation Using Biclustering
Figure 4 for Automatic Yara Rule Generation Using Biclustering
Viaarxiv icon

KiloGrams: Very Large N-Grams for Malware Classification

Add code
Bookmark button
Alert button
Aug 01, 2019
Edward Raff, William Fleming, Richard Zak, Hyrum Anderson, Bill Finlayson, Charles Nicholas, Mark McLean

Figure 1 for KiloGrams: Very Large N-Grams for Malware Classification
Figure 2 for KiloGrams: Very Large N-Grams for Malware Classification
Figure 3 for KiloGrams: Very Large N-Grams for Malware Classification
Figure 4 for KiloGrams: Very Large N-Grams for Malware Classification
Viaarxiv icon

RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

Add code
Bookmark button
Alert button
May 16, 2019
Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak

Figure 1 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Figure 2 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Figure 3 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Figure 4 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Viaarxiv icon

Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus

Add code
Bookmark button
Alert button
Jun 12, 2018
William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas

Figure 1 for Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
Figure 2 for Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
Figure 3 for Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
Figure 4 for Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
Viaarxiv icon