Segui
Richard J. Zak
Richard J. Zak
Email verificata su umbc.edu - Home page
Titolo
Citata da
Citata da
Anno
An investigation of byte n-gram features for malware classification
E Raff, R Zak, R Cox, J Sylvester, P Yacci, R Ward, A Tracy, M McLean, ...
Journal of Computer Virology and Hacking Techniques 14, 1-20, 2018
2022018
Relext: Relation extraction using deep learning approaches for cybersecurity knowledge graph improvement
A Pingle, A Piplai, S Mittal, A Joshi, J Holt, R Zak
Proceedings of the 2019 IEEE/ACM International Conference on Advances in …, 2019
1442019
Creating cybersecurity knowledge graphs from malware after action reports
A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak
IEEE Access 8, 211691-211703, 2020
1102020
Classifying sequences of extreme length with constant memory applied to malware detection
E Raff, W Fleshman, R Zak, HS Anderson, B Filar, M McLean
Proceedings of the AAAI Conference on Artificial Intelligence 35 (11), 9386-9394, 2021
612021
Static malware detection & subterfuge: Quantifying the robustness of machine learning and current anti-virus
W Fleshman, E Raff, R Zak, M McLean, C Nicholas
2018 13th International Conference on Malicious and Unwanted Software …, 2018
572018
What can N-grams learn for malware detection?
R Zak, E Raff, C Nicholas
2017 12th International Conference on Malicious and Unwanted Software …, 2017
502017
Automatic yara rule generation using biclustering
E Raff, R Zak, G Lopez Munoz, W Fleming, HS Anderson, B Filar, ...
Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security …, 2020
412020
Kilograms: Very large n-grams for malware classification
E Raff, W Fleming, R Zak, H Anderson, B Finlayson, C Nicholas, ...
arXiv preprint arXiv:1908.00200, 2019
252019
RelExt
A Pingle, A Piplai, S Mittal, A Joshi, J Holt, R Zak
Proceedings of the 2019 IEEE/ACM International Conference on Advances in …, 2019
22019
Minimizing Compute Costs: When Should We Run More Expensive Malware Analysis?
AT Nguyen, R Zak, LE Richards, M Fuchs, F Lu, R Brandon, GL Munoz, ...
CAMLIS, 81-99, 2022
12022
Is Function Similarity Over-Engineered? Building a Benchmark
R Saul, C Liu, N Fleischmann, R Zak, K Micinski, E Raff, J Holt
arXiv preprint arXiv:2410.22677, 2024
2024
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports
TIM FININ, J HOLT, R ZAK
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–12