• Publications
  • Influence
A Framework for Analyzing Ransomware using Machine Learning
TLDR
A reverse engineering framework incorporating feature generation engines and machine learning (ML) to efficiently detect ransomware is developed and it is demonstrated that the combination of static level analysis at the ASM-level and DLL-level can better distinguish ransomware from normal binaries.
Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station
TLDR
This paper proposes the deep learning-based novel ransomware detection framework in the SCADA controlled electric vehicle charging station (EVCS) with the performance analysis of three deep learning algorithms, namely DNN, 1D convolution neural network (CNN), and long short-term memory (LSTM) recurrent neural network.
AI-Powered Ransomware Detection Framework
TLDR
An AI-based ransomware detection framework and designing a detection tool (AIRaD) using a combination of both static and dynamic malware analysis techniques are proposed.
Stylometry as a Reliable Method for Fallback Authentication
TLDR
This paper proposed to detect differences between writings on the same topic provided by a set of users and tested whether these differences are enough to use for an authentication system and observed that the combination of textual features can support authenticity of the user.
Detect Review Manipulation by Leveraging Reviewer Historical Stylometrics in Amazon, Yelp, Facebook and Google Reviews
TLDR
This paper provides a historical stylometry based methodology to detect review manipulations and supported that with results from Amazon, Yelp, Google, and Facebook.
Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review
TLDR
An overview of bio-inspired algorithms application and evaluations, taking into account cloud security challenges, such as Identity and Authentication, Access Control Systems, Protocol and Network Security, Trust Management, Intrusion Detection, Virtualization, and Forensic are provided.
A Genetic Algorithm Approach to Optimize Dispatching for A Microgrid Energy System with Renewable Energy Sources
TLDR
A genetic algorithm approach is applied in this project to find the optimal solution of energy scheduling throughout a day, simultaneously using the concept of network reconfiguration, and shows that, it is possible to get 1MW less line lose compared to general condition.
PEFile Analysis: A Static Approach To Ransomware Analysis
TLDR
The experiment reveals that the static behaviors of the ransomware can be compiled to build a feature database for further analysis such as machine learning classification techniques to detect ransomware.
Shamir's Secret Sharing for Authentication without Reconstructing Password
TLDR
This paper proposes an authentication protocol which will use Shamir's secret sharing method to authenticate with server, and will be able to solve the problem that complete data exposure from server will not reveal the actual password provided by the user.
A Hybrid POW-POS Implementation Against 51 percent Attack in Cryptocurrency System
TLDR
A step by step process to implement a Hybrid PoW-PoS based consensus protocol which provides a uniform distribution of mining reward to the stake holders and investors by maintaining a precise block generation interval with difficulty adjustment in PoW mining and probability calculation for stake holders according to their matured staking balance.
...
1
2
...