A machine learning approach to detection of JavaScript-based attacks using AST features and paragraph vectors S Ndichu, S Kim, S Ozawa, T Misu, K Makishima Applied Soft Computing 84, 105721, 2019 | 73 | 2019 |
Deobfuscation, unpacking, and decoding of obfuscated malicious JavaScript for machine learning models detection performance improvement S Ndichu, S Kim, S Ozawa CAAI Transactions on Intelligence Technology 5 (3), 184-192, 2020 | 46 | 2020 |
Combat security alert fatigue with AI-assisted techniques T Ban, N Samuel, T Takahashi, D Inoue Cyber Security Experimentation and Test Workshop, 9-16, 2021 | 44 | 2021 |
A machine learning approach to malicious JavaScript detection using fixed length vector representation S Ndichu, S Ozawa, T Misu, K Okada 2018 International Joint Conference on Neural Networks (IJCNN), 1-8, 2018 | 33 | 2018 |
A remote access security model based on vulnerability management S Ndichu, S McOyowo, H Okoyo, C Wekesa Modern Education & Computer science Press, 2020 | 25 | 2020 |
Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response T Ban, T Takahashi, S Ndichu, D Inoue Applied Sciences 13 (11), 6610, 2023 | 17 | 2023 |
A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs S Ndichu, T Ban, T Takahashi, D Inoue 2021 IEEE International Conference on Big Data (Big Data), 2119-2127, 2021 | 13 | 2021 |
Deobfuscation, unpack-465 ing, and decoding of obfuscated malicious JavaScript for 466 machine learning models detection performance improve-467 ment [J] S Ndichu, S Kim, S Ozawa CAAI Transactions on Intelligence Technology 468 (5), 3, 2020 | 13* | 2020 |
AI-Assisted Security Alert Data Analysis with Imbalanced Learning Methods S Ndichu, T Ban, T Takahashi, D Inoue Applied Sciences 13 (3), 1977, 2023 | 7 | 2023 |
A domains approach to remote access logical vulnerabilities classification S Ndichu, S McOyowo, H Okoyo, C Wekesa MECS: http://www. mecspress. org/ijcnis/ijcnis-v11-n11/IJCNIS-V11-N11-5. pdf., 2019 | 7 | 2019 |
Detecting Web-Based Attacks with SHAP and Tree Ensemble Machine Learning Methods S Ndichu, S Kim, S Ozawa, T Ban, T Takahashi, D Inoue Applied Sciences 12 (1), 60, 2021 | 6 | 2021 |
Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks S Ndichu, T Ban, T Takahashi, D Inoue 2022 17th Asia Joint Conference on Information Security (AsiaJCIS), 1-7, 2022 | 5 | 2022 |
Critical-Threat-Alert Detection using Online Machine Learning S Ndichu, T Ban, T Takahashi, D Inoue 2022 IEEE International Conference on Big Data (Big Data), 3007-3014, 2022 | 3 | 2022 |
A Review of Security Vulnerabilities, Controls and Models in Networked Environments S Ndichu, S McOyowo, C Wekesa International Journal of Latest Research in Engineering and Technology …, 2016 | 3 | 2016 |
Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods S Ndichu, S McOyowo, H Okoyo, C Wekesa International Journal of Computer Network and Information Security 15 (2), 48-61, 2023 | 1 | 2023 |
Web Based Integrated Evaluation Framework for Information Security Preparedness in Law Enforcement Agencies S Ndichu, P Ogao International Journal of Computer Science and Information Security (IJCSIS …, 2016 | 1 | 2016 |
Machine Learning–Based Security Alert Screening with Focal Loss S Ndichu, T Ban, T Takahashi, D Inoue 2023 IEEE International Conference on Big Data (BigData), 3043-3052, 2023 | | 2023 |
Poster: A Machine Learning Model Performance Improvement Approach to Detection of Obfuscated JavaScript-based Attacks S Ndichu, S Kim, S Ozawa Network and Distributed Systems Security (NDSS) Symposium 2020, 2020 | | 2020 |
A Review of Information Security Preparedness Evaluation Mechanisms in Law Enforcement Agencies S Ndichu, P Ogao IOSR Journal of Computer Engineering (IOSR-JCE) 18 (4), 58-63, 2016 | | 2016 |
Web based integrated evaluation framework for information security preparedness in law enforcement agencies S Ndichu KCA UNIVERSITY, 2012 | | 2012 |