Automated malware detection using artifacts in forensic memory images R Mosli, R Li, B Yuan, Y Pan 2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-6, 2016 | 91 | 2016 |
A behavior-based approach for malware detection R Mosli, R Li, B Yuan, Y Pan Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International …, 2017 | 45 | 2017 |
They might not be giants: Crafting black-box adversarial examples with fewer queries using particle swarm optimization R Mosli, M Wright, B Yuan, Y Pan arXiv preprint arXiv:1909.07490, 2019 | 17 | 2019 |
They might not be giants crafting black-box adversarial examples using particle swarm optimization R Mosli, M Wright, B Yuan, Y Pan Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 9 | 2020 |
Creating adversarial malware examples through guided metamorphic changes R Mosli, TJ Slota, Y Pan 2021 IEEE International Symposium on Technologies for Homeland Security (HST …, 2021 | 5 | 2021 |
Crafting adversarial examples using particle swarm optimization R Mosli Rochester Institute of Technology, 2020 | 2 | 2020 |
Optimal Job Role Allocation for Compliance with NCA-ECC Controls Using the Saudi Cybersecurity Workforce Framework R Mosli IEEE Access, 2024 | | 2024 |
Word prediction using Dynamic Skip Connections along with ARABERT and LSTM in Arabic Language A Almalki, F Kateb, R Mosli ASEAN Journal on Science and Technology for Development 41 (1), 11, 2024 | | 2024 |
On the viability of data collection using Google Rapid Response for enterprise-level malware research R Mosli, B Yuan, Y Pan Digital Investigation 26, S139, 2018 | | 2018 |
Reapir: Generating Adversarial Malware Through Api-Call Substitutions Only L Kurlandski, R Mosli, Y Pan, S THIANPHAN, M Wright Available at SSRN 4932006, 0 | | |