Mark Stamp

Orcid: 0000-0002-3803-8368

Affiliations:
  • San Jose State University, Department of Computer Science, CA, USA


According to our database1, Mark Stamp authored at least 119 papers between 1992 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Social media bot detection using Dropout-GAN.
J. Comput. Virol. Hacking Tech., November, 2024

A comparison of adversarial malware generators.
J. Comput. Virol. Hacking Tech., November, 2024

Creating valid adversarial examples of malware.
J. Comput. Virol. Hacking Tech., November, 2024

Classification and online clustering of zero-day malware.
J. Comput. Virol. Hacking Tech., November, 2024

A natural language processing approach to Malware classification.
J. Comput. Virol. Hacking Tech., 2024

A comparison of graph neural networks for malware classification.
J. Comput. Virol. Hacking Tech., 2024

Distinguishing Chatbot from Human.
CoRR, 2024

Online Clustering of Known and Emerging Malware Families.
CoRR, 2024

2023
Generative adversarial networks and image-based malware classification.
J. Comput. Virol. Hacking Tech., November, 2023

An empirical analysis of the shift and scale parameters in BatchNorm.
Inf. Sci., August, 2023

Darknet traffic classification and adversarial attacks using machine learning.
Comput. Secur., April, 2023

Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo.
J. Comput. Virol. Hacking Tech., March, 2023

On the Steganographic Capacity of Selected Learning Models.
CoRR, 2023

A Comparison of Adversarial Learning Techniques for Malware Detection.
CoRR, 2023

Hidden Markov Models with Random Restarts vs Boosting for Malware Detection.
CoRR, 2023

Keystroke Dynamics for User Identification.
CoRR, 2023

Classifying World War II Era Ciphers with Machine Learning.
CoRR, 2023

Steganographic Capacity of Deep Learning Models.
CoRR, 2023

2022
Predicting Pedestrian Crosswalk Behavior Using Convolutional Neural Networks.
CoRR, 2022

Darknet Traffic Classification and Adversarial Attacks.
CoRR, 2022

Hidden Markov Models with Momentum.
CoRR, 2022

Robustness of Image-Based Malware Analysis.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

2021
Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication.
CoRR, 2021

Clickbait Detection in YouTube Videos.
CoRR, 2021

Machine Learning-Based Analysis of Free-Text Keystroke Dynamics.
CoRR, 2021

Free-Text Keystroke Dynamics for User Authentication.
CoRR, 2021

Machine Learning for Malware Evolution Detection.
CoRR, 2021

Auxiliary-Classifier GAN for Malware Analysis.
CoRR, 2021

Machine Learning and Deep Learning for Fixed-Text Keystroke Dynamics.
CoRR, 2021

An Empirical Analysis of Image-Based Learning Techniques for Malware Classification.
CoRR, 2021

CNN vs ELM for Image-Based Malware Classification.
CoRR, 2021

On Ensemble Learning.
CoRR, 2021

Sentiment Analysis for Troll Detection on Weibo.
CoRR, 2021

A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification.
CoRR, 2021

Cluster Analysis of Malware Family Relationships.
CoRR, 2021

Word Embedding Techniques for Malware Evolution Detection.
CoRR, 2021

Universal Adversarial Perturbations and Image Spam Classifiers.
CoRR, 2021

Computer-aided diagnosis of low grade endometrial stromal sarcoma (LGESS).
Comput. Biol. Medicine, 2021

Malware Classification with GMM-HMM Models.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Malware Classification with Word Embedding Features.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

A New Dataset for Smartphone Gesture-based Authentication.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Malware Classification using Long Short-term Memory Models.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
Convolutional neural networks and extreme learning machines for malware classification.
J. Comput. Virol. Hacking Tech., 2020

Multifamily malware models.
J. Comput. Virol. Hacking Tech., 2020

Convolutional neural networks for image spam detection.
Inf. Secur. J. A Glob. Perspect., 2020

Detecting malware evolution using support vector machines.
Expert Syst. Appl., 2020

Black box analysis of android malware detectors.
Array, 2020

2019
An analysis of Android adware.
J. Comput. Virol. Hacking Tech., 2019

Hidden Markov models with random restarts versus boosting for malware detection.
J. Comput. Virol. Hacking Tech., 2019

Feature analysis of encrypted malicious traffic.
Expert Syst. Appl., 2019

A Comparative Analysis of Android Malware.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Transfer Learning for Image-based Malware Classification.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
A Survey of Machine Learning Algorithms and Their Application in Information Security.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Function Call Graphs Versus Machine Learning for Malware Detection.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Masquerade Detection on Mobile Devices.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Vigenère scores for malware detection.
J. Comput. Virol. Hacking Tech., 2018

Image spam analysis and detection.
J. Comput. Virol. Hacking Tech., 2018

Deep Learning versus Gist Descriptors for Image-based Malware Classification.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Autocorrelation Analysis of Financial Botnet Traffic.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Acoustic Gait Analysis using Support Vector Machines.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Robust Hashing for Image-based Malware Classification.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Support Vector Machines for Image Spam Analysis.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

On the Effectiveness of Generic Malware Models.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Hidden Markov Models for Vigenère Cryptanalysis.
Proceedings of the 1st International Conference on Historical Cryptology, 2018

2017
A completely covert audio channel in Android.
J. Comput. Virol. Hacking Tech., 2017

Clustering for malware classification.
J. Comput. Virol. Hacking Tech., 2017

A comparison of static, dynamic, and hybrid analysis for malware detection.
J. Comput. Virol. Hacking Tech., 2017

SocioBot: a Twitter-based botnet.
Int. J. Secur. Networks, 2017

Classic cryptanalysis using hidden Markov models.
Cryptologia, 2017

Static and Dynamic Analysis of Android Malware.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Support vector machines and malware detection.
J. Comput. Virol. Hacking Tech., 2016

Clustering versus SVM for malware detection.
J. Comput. Virol. Hacking Tech., 2016

Advanced transcriptase for JavaScript malware.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

Malware Detection Using Dynamic Birthmarks.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

Static Analysis of Malicious Java Applets.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

2015
Hunting for metamorphic JavaScript malware.
J. Comput. Virol. Hacking Tech., 2015

Dueling hidden Markov models for virus analysis.
J. Comput. Virol. Hacking Tech., 2015

Singular value decomposition and metamorphic detection.
J. Comput. Virol. Hacking Tech., 2015

Hidden Markov models for malware classification.
J. Comput. Virol. Hacking Tech., 2015

Compression-based analysis of metamorphic malware.
Int. J. Secur. Networks, 2015

Masquerade detection on GUI-based Windows systems.
Int. J. Secur. Networks, 2015

2014
Metamorphic code generation from LLVM bytecode.
J. Comput. Virol. Hacking Tech., 2014

Eigenvalue analysis for metamorphic detection.
J. Comput. Virol. Hacking Tech., 2014

Automating NFC message sending for good and evil.
J. Comput. Virol. Hacking Tech., 2014

Hunting for Pirated Software Using Metamorphic Analysis.
Inf. Secur. J. A Glob. Perspect., 2014

Cryptanalysis of Typex.
Cryptologia, 2014

HTTP attack detection using n-gram analysis.
Comput. Secur., 2014

2013
Chi-squared distance and metamorphic virus detection.
J. Comput. Virol. Hacking Tech., 2013

Metamorphic worm that carries its own morphing engine.
J. Comput. Virol. Hacking Tech., 2013

Simple substitution distance and metamorphic detection.
J. Comput. Virol. Hacking Tech., 2013

Structural entropy and metamorphic malware.
J. Comput. Virol. Hacking Tech., 2013

Hidden Markov Models for Software Piracy Detection.
Inf. Secur. J. A Glob. Perspect., 2013

Efficient Cryptanalysis of Homophonic Substitution Ciphers.
Cryptologia, 2013

Deriving common malware behavior through graph clustering.
Comput. Secur., 2013

Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Opcode graph similarity and metamorphic detection.
J. Comput. Virol., 2012

2011
Hunting for undetectable metamorphic viruses.
J. Comput. Virol., 2011

Masquerade detection using profile hidden Markov models.
Comput. Secur., 2011

2010
Software Reverse Engineering.
Proceedings of the Handbook of Information and Communication Security, 2010

iPhone Security Analysis.
J. Information Security, 2010

A highly metamorphic virus generator.
Int. J. Multim. Intell. Secur., 2010

2009
Profile hidden Markov models and metamorphic virus detection.
J. Comput. Virol., 2009

2008
An agent-based privacy-enhancing model.
Inf. Manag. Comput. Secur., 2008

QuickPay Online Payment Protocol.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

2007
Solvable problems in enterprise digital rights management.
Inf. Manag. Comput. Secur., 2007

Sigaba: Cryptanalysis of the Full Keyspace.
Cryptologia, 2007

2006
Hunting for metamorphic engines.
J. Comput. Virol., 2006

P3P privacy enhancing agent.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Role Based Access Control and the JXTA Peer-to-Peer Framework.
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
A characterization of a class of discrete nonlinear feedback systems.
Commun. Inf. Syst., 2005

Stealthy Ciphertext.
Proceedings of The 2005 International Conference on Internet Computing, 2005

Information security - principles and practice.
Wiley, ISBN: 978-0-471-73848-0, 2005

2004
Risks of monoculture.
Commun. ACM, 2004

2003
Digital Rights Management: The Technology Behind the Hype.
J. Electron. Commer. Res., 2003

2002
Risks of digital rights management.
Commun. ACM, 2002

1993
An algorithm for the k-error linear complexity of binary sequences with period 2n.
IEEE Trans. Inf. Theory, 1993

1992
A generalized linear complexity.
PhD thesis, 1992

Circular Binary Sequences.
SIAM Rev., 1992


  Loading...