Author of the publication

Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy?

, , , , and . IEEE BigData, page 3252-3259. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Content analysis and modeling interactions in social engineering attacks.. Texas Tech University, Lubbock, USA, (2022)base-search.net (fttexastechuniv:oai:ttu-ir.tdl.org:2346/90243).Linguistic Features for Detecting Fake Reviews., , , , and . ICMLA, page 352-359. IEEE, (2020)Detecting Phishing URLs using the BERT Transformer Model., , , and . IEEE Big Data, page 2483-2492. IEEE, (2023)Abuse of the Cloud as an Attack Platform., , , , and . COMPSAC, page 1091-1092. IEEE, (2020)Using Transformers for Identification of Persuasion Principles in Phishing Emails., , , and . IEEE Big Data, page 2841-2848. IEEE, (2022)Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy?, , , , and . IEEE BigData, page 3252-3259. IEEE, (2019)Email Embeddings for Phishing Detection., , , , and . IEEE BigData, page 2087-2092. IEEE, (2020)Deception and Lie Detection Using Reduced Linguistic Features, Deep Models and Large Language Models for Transcribed Data., , , and . COMPSAC, page 376-381. IEEE, (2024)Phishing Detection through Email Embeddings., , , , and . CoRR, (2020)A user-centric threat model and repository for cyber attacks., , , , , and . SAC, page 1341-1346. ACM, (2022)