Search Results for author: Martin Jureček

Found 7 papers, 2 papers with code

Online Clustering of Known and Emerging Malware Families

no code implementations6 May 2024 Olha Jurečková, Martin Jureček, Mark Stamp

Clustering algorithms are thus becoming more widely used in computer security to analyze the behavior of malware variants and discover new malware families.

Clustering Computer Security +2

A Comparison of Adversarial Learning Techniques for Malware Detection

no code implementations19 Aug 2023 Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp

Machine learning has proven to be a useful tool for automated malware detection, but machine learning models have also been shown to be vulnerable to adversarial attacks.

Malware Detection

Keystroke Dynamics for User Identification

no code implementations7 Jul 2023 Atharva Sharma, Martin Jureček, Mark Stamp

In previous research, keystroke dynamics has shown promise for user authentication, based on both fixed-text and free-text data.

Creating Valid Adversarial Examples of Malware

1 code implementation23 Jun 2023 Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia

Machine learning is becoming increasingly popular as a go-to approach for many tasks due to its world-class results.

Malware Detection reinforcement-learning +1

Classification and Online Clustering of Zero-Day Malware

no code implementations1 May 2023 Olha Jurečková, Martin Jureček, Mark Stamp, Fabio Di Troia, Róbert Lórencz

Based on the classification score of the multilayer perceptron, we determined which samples would be classified and which would be clustered into new malware families.

Classification Clustering +1

Combining Generators of Adversarial Malware Examples to Increase Evasion Rate

1 code implementation14 Apr 2023 Matouš Kozák, Martin Jureček

Antivirus developers are increasingly embracing machine learning as a key component of malware defense.

Adversarial Attack

Parallel Instance Filtering for Malware Detection

no code implementations28 Jun 2022 Martin Jureček, Olha Jurečková

The main idea of the algorithm is to split the data set into non-overlapping subsets of instances covering the whole data set and apply a filtering process for each subset.

Malware Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.