Deep learning for classification of malware system call sequences B Kolosnjaji, A Zarras, G Webster, C Eckert AI 2016: Advances in Artificial Intelligence: 29th Australasian Joint …, 2016 | 703 | 2016 |
Adversarial malware binaries: Evading deep learning for malware detection in executables B Kolosnjaji, A Demontis, B Biggio, D Maiorca, G Giacinto, C Eckert, ... 2018 26th European signal processing conference (EUSIPCO), 533-537, 2018 | 469 | 2018 |
Empowering convolutional networks for malware classification and analysis B Kolosnjaji, G Eraisha, G Webster, A Zarras, C Eckert 2017 International Joint Conference on Neural Networks (IJCNN), 3838-3845, 2017 | 134 | 2017 |
Neural network-based user-independent physical activity recognition for mobile devices B Kolosnjaji, C Eckert Intelligent Data Engineering and Automated Learning–IDEAL 2015: 16th …, 2015 | 68 | 2015 |
Classifying malware attacks in IaaS cloud environments N Rakotondravony, B Taubmann, W Mandarawi, E Weishäupl, P Xu, ... Journal of Cloud Computing 6, 1-12, 2017 | 58 | 2017 |
Adaptive semantics-aware malware classification B Kolosnjaji, A Zarras, T Lengyel, G Webster, C Eckert International Conference on Detection of Intrusions and Malware, and …, 2016 | 41 | 2016 |
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage GD Webster, B Kolosnjaji, C von Pentz, J Kirsch, ZD Hanif, A Zarras, ... Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017 | 40 | 2017 |
Manis: Evading malware detection system on graph structure P Xu, B Kolosnjaji, C Eckert, A Zarras Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1688-1695, 2020 | 18 | 2020 |
CloudIDEA: a malware defense architecture for cloud data centers A Fischer, T Kittel, B Kolosnjaji, TK Lengyel, W Mandarawi, H de Meer, ... On the Move to Meaningful Internet Systems: OTM 2015 Conferences …, 2015 | 15 | 2015 |
Architecture for Resource-Aware VMI-based Cloud Malware Analysis B Taubmann, B Kolosnjaji Proceedings of the 4th Workshop on Security in Highly Connected IT Systems …, 2017 | 9 | 2017 |
Learning on a Budget for User Authentication on Mobile Devices B Kolosnjaji, A Hüfner, C Eckert, A Zarras 2018 IEEE International Conference on Acoustics, Speech and Signal …, 2018 | 3 | 2018 |
SYSTEMS AND METHODS FOR MACHINE LEARNING BASED NETWORK ALERT SEQUENCE ANOMALY DETECTION B Kolosnjaji, P Intallura, H Xiao US Patent App. 18/920,342, 2025 | | 2025 |
Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization B Kolosnjaji, H Xiao, P Xu, A Zarras Packt Publishing Ltd, 2024 | | 2024 |
Network inventory management and anomaly detection system H Xiao, G Webster, B Kolosnjaji, A Carney US Patent App. 17/945,711, 2024 | | 2024 |
Label-Efficient and Robust Learning from Multiple Experts B Kolosnjaji, A Zarras ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023 | | 2023 |
Machine Learning for Anomaly Detection Under Constraints B Kolosnjaji Technische Universität München, 2019 | | 2019 |