A Framework for Efficient Mining of Structural Information to Detect Zero-Day Malicious Portable Executables |
Authors : |
M. Zubair Shafiq, Syeda Momina Tabish, Fauzan Mirza and Muddassar Farooq |
Conference/Journal : |
|
Publishing Information : |
TR-nexGINRC-2009-21 |
Place : |
|
Download : |
tr21-zubair.pdf
|
|
Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets |
Authors : |
Ajay Kumar Tanwani, Jamal Afridi, M. Zubair Shafiq, Muddassar Farooq |
Conference/Journal : |
7th European Conference on Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics (EvoBIO) |
Publishing Information : |
Volume 5483 of Lecture Notes in Computer Science, pp. 128-139, Springer |
Place : |
Tübingen, Germany |
Download : |
evobio09-ajay.pdf
|
|
Application of Evolutionary Algorithms in Detection of SIP based Flooding Attacks |
Authors : |
M. Ali Akbar, Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
gecco09-ali.pdf
|
|
IMAD: In-Execution Malware Analysis and Detection |
Authors : |
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
gecco09-bilal.pdf
|
|
Are Evolutionary Rule Learning Algorithms Appropriate for Malware Detection? |
Authors : |
M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
gecco09-zubair.pdf
|
|
Evolvable Malware |
Authors : |
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
gecco09-sadia.pdf
|
|
On the Appropriateness of Evolutionary Rule Learning Algorithms for Malware Detection |
Authors : |
M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq |
Conference/Journal : |
International Workshop on Learning Classifier Systems (IWLCS), held in conjunction with Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
iwlcs09-zubair.pdf
|
|
A Hybrid GA-PSO Fuzzy System for User Identification on Smart Phones |
Authors : |
Muhammad Shahzad, Saira Zahid, Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
gecco09-shahzad.pdf
|
|
Performance Evaluation of Evolutionary Algorithms in Classification of Biomedical Datasets |
Authors : |
Ajay Kumar Tanwani, Muddassar Farooq |
Conference/Journal : |
International Workshop on Learning Classifier Systems (IWLCS), held in conjunction with Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
iwlcs09-ajay.pdf
|
|
The Role of Biomedical Dataset in Classification |
Authors : |
Ajay Kumar Tanwani, Muddassar Farooq |
Conference/Journal : |
12th Conference on Artificial Intelligence in Medicine (AIME'09) |
Publishing Information : |
Springer Verlag |
Place : |
Verona, Italy |
Download : |
aime09-ajay.pdf
|
|
A Sense of `Danger' for Windows Processes |
Authors : |
Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq |
Conference/Journal : |
International Conference on Research in Artificial Immune Systems |
Publishing Information : |
Lecture Notes in Computer Science, Springer |
Place : |
York, UK |
Download : |
icaris09-salman.pdf
|
|
Malware Detection using Statistical Analysis of Byte-Level File Content |
Authors : |
S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq |
Conference/Journal : |
ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), Workshop on CyberSecurity and Intelligence Informatics (CSI) |
Publishing Information : |
ACM Press |
Place : |
Paris, France |
Download : |
kdd09-momina.pdf
|
|
A Ubiquitous Real-Time Motion Artifact Rejection technique for Remote NIBP Monitoring of Hypertensive Patients |
Authors : |
Ali Hasnain, Mudaser Awan, Muddassar Farooq |
Conference/Journal : |
World Congress on Medical Physics and Bio-medical Engineering |
Publishing Information : |
Springer Verlag |
Place : |
Munich, Germany |
Download : |
worldcongress09-ali.pdf
|
|
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime |
Authors : |
M. Zubair Shafiq, Syeda Momina Tabish, Fauzan Mirza, Muddassar Farooq |
Conference/Journal : |
12th International Symposium On Recent Advances In Intrusion Detection (RAID) |
Publishing Information : |
Lecture Notes in Computer Science, Springer |
Place : |
France |
Download : |
raid09-zubair.pdf
|
|
Keystroke-based User Identification on Smart Phones |
Authors : |
Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq |
Conference/Journal : |
12th International Symposium On Recent Advances In Intrusion Detection (RAID) |
Publishing Information : |
Lecture Notes in Computer Science, Springer |
Place : |
France |
Download : |
raid09-saira.pdf
|
|
PE-probe: leveraging packer detection and structural information to detect malicious portable executables |
Authors : |
M. Zubair Shafiq, Syeda Momina Tabish, Muddassar Farooq |
Conference/Journal : |
18th Virus Bulletin Conference (VB) |
Publishing Information : |
Virus Bulletin |
Place : |
Switzerland |
Download : |
vb09-zubair.pdf
|
|
On the Inefficient Use of Entropy for Anomaly Detection |
Authors : |
Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam |
Conference/Journal : |
12th International Symposium On Recent Advances In Intrusion Detection (RAID) |
Publishing Information : |
Extended Abstract, Lecture Notes in Computer Science, Springer |
Place : |
France |
Download : |
raid09-mobin.pdf
|
|
Using Formal Grammar and Genetic Operators to Evolve Malware |
Authors : |
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq |
Conference/Journal : |
12th International Symposium On Recent Advances In Intrusion Detection (RAID) |
Publishing Information : |
Extended Abstract, Lecture Notes in Computer Science, Springer |
Place : |
France |
Download : |
raid09-sadia.pdf
|
|
Evaluating DoS Attacks Against SIP-Based VoIP Systems |
Authors : |
M. Zubair Rafique, M. Ali Akbar and Muddassar Farooq |
Conference/Journal : |
IEEE Global Communications Conference (GLOBECOM 2009) |
Publishing Information : |
IEEE Press |
Place : |
Honululu, Hawaii USA |
Download : |
globecom09-zubair.pdf
|
|
Using Spatio-Temporal Information in API Calls with Machine Learning Algorithms for Malware Detection |
Authors : |
Faraz Ahmed, Haider Hameed, M. Zubair Shafiq, Muddassar Farooq |
Conference/Journal : |
AISec 2009 - The 2nd Workshop on Security and Artificial Intelligence |
Publishing Information : |
Proceedings of the 2nd ACM workshop on Security and artificial intelligence |
Place : |
Chicago, Illinois, USA |
Download : |
aisec09-faraz.pdf
|
|
User Centered Design of E-Health Applications for Remote Patient Management |
Authors : |
Amina Tariq, Ajay Kumar Tanwani and Muddassar Farooq |
Conference/Journal : |
10th Annual Conference of the NZ ACM Special Interest Group on Human-Computer Interaction, CHINZ 2009 |
Publishing Information : |
ACM Press |
Place : |
Auckland, New Zealand |
Download : |
CHINZ09-ajay.pdf
|
|