Deep neural network based malware detection using two dimensional binary program features J Saxe, K Berlin 2015 10th international conference on malicious and unwanted software …, 2015 | 844 | 2015 |
eXpose: A character-level convolutional neural network with embeddings for detecting malicious URLs, file paths and registry keys J Saxe, K Berlin arXiv preprint arXiv:1702.08568, 2017 | 273 | 2017 |
Malicious behavior detection using windows audit logs K Berlin, D Slater, J Saxe Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security …, 2015 | 121 | 2015 |
Methods and apparatus for machine learning based malware detection JD Saxe, K Berlin US Patent 9,690,938, 2017 | 119 | 2017 |
Visualization of shared system call sequence relationships in large malware corpora J Saxe, D Mentis, C Greamo Proceedings of the ninth international symposium on visualization for cyber …, 2012 | 75 | 2012 |
Malware data science: attack detection and attribution J Saxe, H Sanders No Starch Press, 2018 | 72 | 2018 |
SeqDroid: Obfuscated Android malware detection using stacked convolutional and recurrent neural networks WY Lee, J Saxe, R Harang Deep learning applications for cyber security, 197-210, 2019 | 64 | 2019 |
Methods and apparatus for detection of malicious documents using machine learning JD Saxe, R HARANG US Patent 11,003,774, 2021 | 55 | 2021 |
Methods and apparatus for detecting whether a string of characters represents malicious activity using machine learning JD Saxe US Patent 10,318,735, 2019 | 44 | 2019 |
A deep learning approach to fast, format-agnostic detection of malicious web content J Saxe, R Harang, C Wild, H Sanders 2018 IEEE Security and Privacy Workshops (SPW), 8-14, 2018 | 44 | 2018 |
SEEM: a scalable visualization for comparing multiple large sets of attributes for malware analysis R Gove, J Saxe, S Gold, A Long, G Bergamo Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 72-79, 2014 | 41 | 2014 |
Meade: Towards a malicious email attachment detection engine EM Rudd, R Harang, J Saxe 2018 IEEE International Symposium on Technologies for Homeland Security (HST …, 2018 | 40 | 2018 |
Computer augmented threat evaluation JD Saxe, AJ Thomas, R Humphries, SN Reed, KD Ray, JH Levy US Patent 10,938,838, 2021 | 39 | 2021 |
Methods and apparatus for machine learning based malware detection JD Saxe, K Berlin US Patent 9,910,986, 2018 | 34 | 2018 |
CATBERT: Context-aware tiny BERT for detecting social engineering emails Y Lee, J Saxe, R Harang arXiv preprint arXiv:2010.03484, 2020 | 33 | 2020 |
Malware similarity identification using call graph based system call subsequence features K Blokhin, J Saxe, D Mentis 2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013 | 32 | 2013 |
Methods and apparatus for using machine learning on multiple file fragments to identify malware JD Saxe, R Harang US Patent 10,635,813, 2020 | 29 | 2020 |
CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model J Saxe, R Turner, K Blokhin 2014 9th International Conference on Malicious and Unwanted Software: The …, 2014 | 28 | 2014 |
Methods and apparatus for detecting malware samples with similar image sets AM Long, JD Saxe US Patent 9,672,358, 2017 | 25 | 2017 |
Detecting malware samples with similar image sets A Long, J Saxe, R Gove Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 88-95, 2014 | 22 | 2014 |