no code implementations • 6 May 2024 • Olha Jurečková, Martin Jureček, Mark Stamp
Clustering algorithms are thus becoming more widely used in computer security to analyze the behavior of malware variants and discover new malware families.
no code implementations • 19 Aug 2023 • Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp
Machine learning has proven to be a useful tool for automated malware detection, but machine learning models have also been shown to be vulnerable to adversarial attacks.
no code implementations • 7 Jul 2023 • Atharva Sharma, Martin Jureček, Mark Stamp
In previous research, keystroke dynamics has shown promise for user authentication, based on both fixed-text and free-text data.
1 code implementation • 23 Jun 2023 • Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia
Machine learning is becoming increasingly popular as a go-to approach for many tasks due to its world-class results.
no code implementations • 1 May 2023 • Olha Jurečková, Martin Jureček, Mark Stamp, Fabio Di Troia, Róbert Lórencz
Based on the classification score of the multilayer perceptron, we determined which samples would be classified and which would be clustered into new malware families.
1 code implementation • 14 Apr 2023 • Matouš Kozák, Martin Jureček
Antivirus developers are increasingly embracing machine learning as a key component of malware defense.
no code implementations • 28 Jun 2022 • Martin Jureček, Olha Jurečková
The main idea of the algorithm is to split the data set into non-overlapping subsets of instances covering the whole data set and apply a filtering process for each subset.