Malware detection by eating a whole exe E Raff, J Barker, J Sylvester, R Brandon, B Catanzaro, CK Nicholas Workshops at the thirty-second AAAI conference on artificial intelligence, 2018 | 689 | 2018 |
Cluster quality analysis using silhouette score KR Shahapure, C Nicholas 2020 IEEE 7th international conference on data science and advanced …, 2020 | 537 | 2020 |
Combining content and collaboration in text filtering I Soboroff, C Nicholas Proceedings of the IJCAI 99 (1999), 86-91, 1999 | 342 | 1999 |
Ranking retrieval systems without relevance judgments I Soboroff, C Nicholas, P Cahan Proceedings of the 24th annual international ACM SIGIR conference on …, 2001 | 293 | 2001 |
An investigation of byte n-gram features for malware classification E Raff, R Zak, R Cox, J Sylvester, P Yacci, R Ward, A Tracy, M McLean, ... Journal of Computer Virology and Hacking Techniques 14, 1-20, 2018 | 195 | 2018 |
Feature selection and document clustering I Dhillon, J Kogan, C Nicholas Survey of Text Mining: Clustering, Classification, and Retrieval, 73-100, 2004 | 174 | 2004 |
Learning the pe header, malware detection with minimal domain knowledge E Raff, J Sylvester, C Nicholas Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security …, 2017 | 165 | 2017 |
Grouping multidimensional data J Kogan, C Nicholas, M Teboulle Springer-Verlag Berlin Heidelberg, 2006 | 164 | 2006 |
Performance and scalability of a large-scale n-gram based information retrieval system E Millar, D Shen, J Liu, C Nicholas | 133 | 2000 |
ITtalks: A case study in the Semantic Web and DAML+ OIL RS Cost, T Finin, A Joshi, Y Peng, C Nicholas, I Soboroff, H Chen, L Kagal, ... IEEE Intelligent Systems 17 (1), 40-47, 2002 | 121 | 2002 |
An alternative to NCD for large sequences, Lempel-Ziv Jaccard distance E Raff, C Nicholas Proceedings of the 23rd ACM SIGKDD international conference on knowledge …, 2017 | 103 | 2017 |
Collaborative filtering and the generalized vector space model I Soboroff, C Nicholas Proceedings of the 23rd annual international ACM SIGIR conference on …, 2000 | 69 | 2000 |
TELLTALE: Experiments in a dynamic hypertext environment for degraded and multilingual data C Pearce, C Nicholas Journal of the American Society for Information Science 47 (4), 263-275, 1996 | 63 | 1996 |
A survey of machine learning methods and challenges for windows malware classification E Raff, C Nicholas arXiv preprint arXiv:2006.09271, 2020 | 60 | 2020 |
Static malware detection & subterfuge: Quantifying the robustness of machine learning and current anti-virus W Fleshman, E Raff, R Zak, M McLean, C Nicholas 2018 13th International Conference on Malicious and Unwanted Software …, 2018 | 54 | 2018 |
Lempel-Ziv Jaccard Distance, an effective alternative to ssdeep and sdhash E Raff, C Nicholas Digital Investigation 24, 34-49, 2018 | 54 | 2018 |
Malware classification and class imbalance via stochastic hashed lzjd E Raff, C Nicholas Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security …, 2017 | 49 | 2017 |
What can N-grams learn for malware detection? R Zak, E Raff, C Nicholas 2017 12th International Conference on Malicious and Unwanted Software …, 2017 | 47 | 2017 |
Addressing morphological variation in alphabetic languages P McNamee, C Nicholas, J Mayfield Proceedings of the 32nd international ACM SIGIR conference on Research and …, 2009 | 47 | 2009 |
Chameleon: A system for solving the data-translation problem SA Mamrak, MS Kaelbling, CK Nicholas, M Share IEEE Transactions on Software Engineering 15 (9), 1090-1108, 1989 | 46 | 1989 |