Dragos Gavrilut

Orcid: 0009-0004-3339-9625

According to our database1, Dragos Gavrilut authored at least 44 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware.
Int. J. Inf. Sec., February, 2024

GView: A versatile assistant for security researchers.
SoftwareX, 2024

Interactive Assistance in Malware Dissemination Detection and Analysis.
Proceedings of the 1st Workshop on Security-Centric Strategies for Combating Information Disorder, 2024

Benchmarking Out of the Box Open-Source LLMs for Malware Detection Based on API Calls Sequences.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2024, 2024

Real-Time Deep Learning-Based Malware Detection Using Static and Dynamic Features.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

2023
Feature mining and classifier selection for API calls-based malware detection.
Appl. Intell., December, 2023

2022
Evolution of macro VBA obfuscation techniques.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

Improving detection of malicious samples by using state-of-the-art adversarial machine learning algorithms.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

Detection of MSOffice-Embedded Malware: Feature Mining and Short- vs. Long-Term Performance.
Proceedings of the Information Security Practice and Experience, 2022

Using API Calls for Sequence-Pattern Feature Mining-Based Malware Detection.
Proceedings of the Information Security Practice and Experience, 2022

Using GANs to Improve the Accuracy of Machine Learning Models for Malware Detection.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2022, 2022

2021
A Practical Approach For Malware Identification Based On Anti-Emulation Techniques And Feature To Image Translation.
Proceedings of the 31st International Conference on Computer Theory and Applications, 2021

2019
An Adversarial Machine Learning Approach to Evaluate the Robustness of a Security Solution.
Proceedings of the 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2019

Methods for Training Neural Networks with Zero False Positives for Malware Detection.
Proceedings of the 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2019

2018
Anti-emulation trends in modern packers: a survey on the evolution of anti-emulation techniques in UPA packers.
J. Comput. Virol. Hacking Tech., 2018

Adjusting SVMs for Large Data Sets using Balanced Decision Trees.
Proceedings of the 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2018

Increasing Protection Against Internet Attacks through Contextual Feature Pairing.
Proceedings of the 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2018

Optimizing Cleanset Growth by Using Multi-Class Neural Networks.
Proceedings of the 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2018

An Overview of Obfuscation Techniques used by Malware in Visual Basic for Application Scripts.
Proceedings of the 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2018

2017
Machine Learning based Malware Detection. How to Balance Memory Footprint with Model Accuracy.
Proceedings of the 19th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2017

A Comparison of Open-Source Static Analysis Tools for Vulnerability Detection in C/C++ Code.
Proceedings of the 19th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2017

Building a cleanset. An artificial intelligence perspective of identifying network installers.
Proceedings of the 13th IEEE International Conference on Intelligent Computer Communication and Processing, 2017

GPU memory leveraged for accelerated training using Tensorflow.
Proceedings of the 13th IEEE International Conference on Intelligent Computer Communication and Processing, 2017

Perceptron-Based Ensembles and Binary Decision Trees for Malware Detection.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017

2016
A practical approach for clustering large data flows of malicious URLs.
J. Comput. Virol. Hacking Tech., 2016

A scalable approach for detecting plagiarized mobile applications.
Knowl. Inf. Syst., 2016

Identifying DGA-Based Botnets Using Network Anomaly Detection.
Proceedings of the 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2016

Detecting Malicious URLs: A Semi-Supervised Machine Learning System Approach.
Proceedings of the 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2016

2015
Feature Extraction Using Genetic Programming with Applications in Malware Detection.
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015

Improving Malware Detection Response Time with Behavior-Based Statistical Analysis Techniques.
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015

A Study on Techniques for Proactively Identifying Malicious URLs.
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015

Feature Creation Using Genetic Algorithms for Zero False Positive Malware Classification.
Proceedings of the EVOLVE, 2015

2014
A Practical Guide for Detecting the Java Script-Based Malware Using Hidden Markov Models and Linear Classifiers.
Proceedings of the 16th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2014

A Practical Approach on Cleaning-Up Large Data Sets.
Proceedings of the 16th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2014

Combining Restricted Boltzmann Machine and One Side Perceptron for Malware Detection.
Proceedings of the Graph-Based Representation and Reasoning, 2014

2013
Building a practical and reliable classifier for malware detection.
J. Comput. Virol. Hacking Tech., 2013

A study on common malware families evolution in 2012.
J. Comput. Virol. Hacking Tech., 2013

An Automatic Updating Perceptron-Based System for Malware Detection.
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013

2012
A practical approach on clustering malicious PDF documents.
J. Comput. Virol., 2012

The proactivity of Perceptron derived algorithms in malware detection.
J. Comput. Virol., 2012

Optimized Zero False Positives Perceptron Training for Malware Detection.
Proceedings of the 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2012

Practical Optimizations for Perceptron Algorithms in Large Malware Dataset.
Proceedings of the 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2012

2011
Dealing with Class Noise in Large Training Datasets for Malware Detection.
Proceedings of the 13th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2011

2009
Malware detection using machine learning.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2009


  Loading...