Abdurrahman Pektas

Orcid: 0000-0003-1167-0862

According to our database1, Abdurrahman Pektas authored at least 15 papers between 2014 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Deep learning for effective Android malware detection using API call graph embeddings.
Soft Comput., 2020

Learning to detect Android malware via opcode sequences.
Neurocomputing, 2020

2019
Deep learning to detect botnet via network flow summaries.
Neural Comput. Appl., 2019

A deep learning method to detect network intrusion through flow-based features.
Int. J. Netw. Manag., 2019

2018
HoneyThing: A New Honeypot Design for CPE Devices.
KSII Trans. Internet Inf. Syst., 2018

Botnet detection based on network flow summary and deep learning.
Int. J. Netw. Manag., 2018

Malware classification based on API calls and behaviour analysis.
IET Inf. Secur., 2018

2017
Classification of malware families based on runtime behaviors.
J. Inf. Secur. Appl., 2017

Identification of Application in Encrypted Traffic by Using Machine Learning.
Proceedings of the Man-Machine Interactions 5, 2017

Portable Dynamic Malware Analysis with an Improved Scalability and Automatisation.
Proceedings of the 10th International Conference on Computer Recognition Systems CORES 2017, 2017

Ensemble Machine Learning Approach for Android Malware Classification Using Hybrid Features.
Proceedings of the 10th International Conference on Computer Recognition Systems CORES 2017, 2017

2016
Android Malware Classification by Applying Online Machine Learning.
Proceedings of the Computer and Information Sciences - 31st International Symposium, 2016

2015
Classification des logiciels malveillants basée sur le comportement à l'aide de l'apprentissage automatique en ligne. (Behavior based malware classification using online machine learning).
PhD thesis, 2015

Runtime-behavior based malware classification using online machine learning.
Proceedings of the 2015 World Congress on Internet Security, 2015

2014
A dynamic malware analyzer against virtual machine aware malicious software.
Secur. Commun. Networks, 2014


  Loading...