no code implementations • 24 Oct 2023 • Borja Molina-Coronado, Antonio Ruggia, Usue Mori, Alessio Merlo, Alexander Mendiburu, Jose Miguel-Alonso
Therefore, it needs to be determined to what extent the use of a specific obfuscation strategy or tool poses a risk for the validity of ML malware detectors for Android based on static analysis features.
1 code implementation • 25 May 2022 • Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, Jose Miguel-Alonso
As in other cybersecurity areas, machine learning (ML) techniques have emerged as a promising solution to detect Android malware.
no code implementations • 11 Feb 2020 • Ane Blázquez-García, Angel Conde, Usue Mori, Jose A. Lozano
Recent advances in technology have brought major breakthroughs in data collection, enabling a large amount of data to be gathered over time and thus generating time series.
no code implementations • 27 Jan 2020 • Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, José Miguel-Alonso
As such, we discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
no code implementations • 12 Jun 2018 • Amaia Abanda, Usue Mori, Jose A. Lozano
The particularity of the data makes it a challenging task and different approaches have been taken, including the distance based approach.