关注
Rayan Mosli
Rayan Mosli
Assistant Professor, King Abdulaziz University
在 kau.edu.sa 的电子邮件经过验证
标题
引用次数
引用次数
年份
Automated malware detection using artifacts in forensic memory images
R Mosli, R Li, B Yuan, Y Pan
2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-6, 2016
972016
A behavior-based approach for malware detection
R Mosli, R Li, B Yuan, Y Pan
Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International …, 2017
502017
They might not be giants: Crafting black-box adversarial examples with fewer queries using particle swarm optimization
R Mosli, M Wright, B Yuan, Y Pan
arXiv preprint arXiv:1909.07490, 2019
172019
They might not be giants crafting black-box adversarial examples using particle swarm optimization
R Mosli, M Wright, B Yuan, Y Pan
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
102020
Creating adversarial malware examples through guided metamorphic changes
R Mosli, TJ Slota, Y Pan
2021 IEEE International Symposium on Technologies for Homeland Security (HST …, 2021
52021
Crafting adversarial examples using particle swarm optimization
R Mosli
Rochester Institute of Technology, 2020
22020
Enhancing real-time intrusion detection system for in-vehicle networks by employing novel feature engineering techniques and lightweight modeling
W Aljabri, MA Hamid, R Mosli
Ad Hoc Networks, 103737, 2024
2024
Lightweight and Adaptive Data-Driven Intrusion Detection System for Autonomous Vehicles
W Aljabri, MA Hamid, R Mosli
IEEE Transactions on Intelligent Transportation Systems, 2024
2024
Optimal Job Role Allocation for Compliance with NCA-ECC Controls Using the Saudi Cybersecurity Workforce Framework
R Mosli
IEEE Access, 2024
2024
Word prediction using Dynamic Skip Connections along with ARABERT and LSTM in Arabic Language
A Almalki, F Kateb, R Mosli
ASEAN Journal on Science and Technology for Development 41 (1), 11, 2024
2024
On the viability of data collection using Google Rapid Response for enterprise-level malware research
R Mosli, B Yuan, Y Pan
Digital Investigation 26, S139, 2018
2018
Reapir: Generating Adversarial Malware Through Api-Call Substitutions Only
L Kurlandski, R Mosli, Y Pan, S THIANPHAN, M Wright
Available at SSRN 4932006, 0
系统目前无法执行此操作,请稍后再试。
文章 1–12