Picture for Chen Hajaj

Chen Hajaj

Enhancing Encrypted Internet Traffic Classification Through Advanced Data Augmentation Techniques

Add code
Jul 23, 2024
Viaarxiv icon

CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution

Add code
Mar 17, 2024
Figure 1 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Figure 2 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Figure 3 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Figure 4 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Viaarxiv icon

Open-Source Framework for Encrypted Internet and Malicious Traffic Classification

Add code
Jun 21, 2022
Figure 1 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Figure 2 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Figure 3 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Figure 4 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Viaarxiv icon

When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification

Add code
Jun 16, 2022
Figure 1 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Figure 2 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Figure 3 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Figure 4 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Viaarxiv icon

MaMaDroid2.0 -- The Holes of Control Flow Graphs

Add code
Feb 28, 2022
Figure 1 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 2 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 3 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 4 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Viaarxiv icon

A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to Malware Detection

Add code
Jun 13, 2018
Figure 1 for A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to Malware Detection
Figure 2 for A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to Malware Detection
Figure 3 for A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to Malware Detection
Figure 4 for A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to Malware Detection
Viaarxiv icon