Malware detection using machine learning and deep learning H Rathore, S Agarwal, SK Sahay, M Sewak Big Data Analytics: 6th International Conference, BDA 2018, Warangal, India …, 2018 | 177 | 2018 |
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey A Sharma, SK Sahay International Journal of Computer Applications 90 (2), 7-11, 2014 | 132 | 2014 |
Comparison of deep learning and the classical machine learning algorithm for the malware detection M Sewak, SK Sahay, H Rathore 2018 19th IEEE/ACIS international conference on software engineering …, 2018 | 126 | 2018 |
An Overview of Deep Learning Architecture of Deep Neural Networks and Autoencoders M Sewak, SK Sahay, H Rathore Journal of Computational and Theoretical Nanoscience 17 (1), 182–188, 2020 | 108 | 2020 |
Detection of advanced malware by machine learning techniques S Sharma, C Rama Krishna, SK Sahay Soft Computing: Theories and Applications: Proceedings of SoCTA 2017, 333-342, 2019 | 97 | 2019 |
Robust android malware detection system against adversarial attacks using q-learning H Rathore, SK Sahay, P Nikam, M Sewak Information Systems Frontiers 23, 867-882, 2021 | 78 | 2021 |
Evolution of malware and its detection techniques SK Sahay, A Sharma, H Rathore Information and Communication Technology for Sustainable Development …, 2020 | 71 | 2020 |
An investigation of a deep learning based malware detection system M Sewak, SK Sahay, H Rathore Proceedings of the 13th International Conference on Availability …, 2018 | 63 | 2018 |
Deep reinforcement learning in the advanced cybersecurity threat detection and protection M Sewak, SK Sahay, H Rathore Information Systems Frontiers 25 (2), 589-611, 2023 | 62 | 2023 |
An effective approach for classification of advanced malware with high accuracy A Sharma, SK Sahay International Journal of Security and Its Applications 10 (4), 249-266, 2016 | 53 | 2016 |
Grouping the executables to detect malware with high accuracy SK Sahay, A Sharma Procedia Computer Science 78, 667 - 674, 2016 | 43 | 2016 |
Web Document Clustering and Ranking using Tf-Idf based Apriori Approach RK Roul, OR Devanand, SK Sahay International Conference on Advances in Computer Engineering & Applications …, 2014 | 38 | 2014 |
Deep reinforcement learning for cybersecurity threat detection and protection: A review M Sewak, SK Sahay, H Rathore International Conference On Secure Knowledge Management In Artificial …, 2021 | 36 | 2021 |
Identification of significant permissions for efficient android malware detection H Rathore, SK Sahay, R Rajvanshi, M Sewak International conference on broadband communications, networks and systems …, 2020 | 33 | 2020 |
A novel modified apriori approach for web document clustering RK Roul, S Varshneya, A Kalra, SK Sahay Computational Intelligence in Data Mining-Volume 3: Proceedings of the …, 2015 | 28 | 2015 |
Robust malware detection models: learning from adversarial attacks and defenses H Rathore, A Samavedhi, SK Sahay, M Sewak Forensic Science International: Digital Investigation 37, 301183, 2021 | 27 | 2021 |
Detection of malicious android applications: Classical machine learning vs. deep neural network integrated with clustering H Rathore, SK Sahay, S Thukral, M Sewak International conference on broadband communications, networks and systems …, 2020 | 24 | 2020 |
Doom: a novel adversarial-drl-based op-code level metamorphic malware obfuscator for the enhancement of ids M Sewak, SK Sahay, H Rathore Adjunct proceedings of the 2020 ACM international joint conference on …, 2020 | 24 | 2020 |
Improving the detection accuracy of unknown malware by partitioning the executables in groups A Sharma, SK Sahay, A Kumar Advanced Computing and Communication Technologies: Proceedings of the 9th …, 2016 | 24 | 2016 |
DeepIntent: ImplicitIntent based Android IDS with E2E Deep Learning architecture M Sewak, SK Sahay, H Rathore 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile …, 2020 | 22 | 2020 |