Shashank Tripathi, Pranav Saxena, Harsh D. Dwivedi, Shashank Gupta
{"title":"Defending Web Applications Against JavaScript Worms on Core Network of Cloud Platforms","authors":"Shashank Tripathi, Pranav Saxena, Harsh D. Dwivedi, Shashank Gupta","doi":"10.1201/9780429504044-13","DOIUrl":"https://doi.org/10.1201/9780429504044-13","url":null,"abstract":"","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123906229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. B. Gupta, Shashank Gupta, Shubham Goel, N. Bhardwaj, Jaiveer Singh
{"title":"A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls","authors":"B. B. Gupta, Shashank Gupta, Shubham Goel, N. Bhardwaj, Jaiveer Singh","doi":"10.1201/9780429504044-7","DOIUrl":"https://doi.org/10.1201/9780429504044-7","url":null,"abstract":"","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123042956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Alauthman, Ammar Almomani, Mohammed Alweshah, Waleed Omoush, Kamal Alieyan
{"title":"Machine Learning for Phishing Detection and Mitigation","authors":"Mohammad Alauthman, Ammar Almomani, Mohammed Alweshah, Waleed Omoush, Kamal Alieyan","doi":"10.1201/9780429504044-2","DOIUrl":"https://doi.org/10.1201/9780429504044-2","url":null,"abstract":"","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127141446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Á. Gómez, Lorenzo Fernández Maimó, F. J. G. Clemente
{"title":"A Deep Learning-based System for Network Cyber Threat Detection","authors":"Á. Gómez, Lorenzo Fernández Maimó, F. J. G. Clemente","doi":"10.1201/9780429504044-1","DOIUrl":"https://doi.org/10.1201/9780429504044-1","url":null,"abstract":"","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128045151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection","authors":"B. Singla, A. Verma, L. Raheja","doi":"10.1201/9780429504044-11","DOIUrl":"https://doi.org/10.1201/9780429504044-11","url":null,"abstract":"","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131676071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}