Machine learning aided static malware analysis: A survey and tutorial

A Shalaginov, S Banin, A Dehghantanha… - Cyber threat …, 2018 - Springer
Malware analysis and detection techniques have been evolving during the last decade as a
reflection to development of different malware techniques to evade network-based and host …

Towards plausible lithological classification from geophysical inversion: honouring geological principles in subsurface imaging

J Giraud, M Lindsay, M Jessell, V Ogarko - Solid Earth, 2020 - se.copernicus.org
We propose a methodology for the recovery of lithologies from geological and geophysical
modelling results and apply it to field data. Our technique relies on classification using self …

Multipopulation nature-inspired algorithm (MNIA) for the designing of interpretable fuzzy systems

A Słowik, K Cpałka, K Łapa - IEEE Transactions on Fuzzy …, 2019 - ieeexplore.ieee.org
The solutions proposed in this article are based on our experience with fuzzy systems (FSs),
their interpretability, and population-based algorithms (PBAs). They provide a consistent …

A probabilistic framework for behavioral identification from animal-borne accelerometers

JE Dentinger, L Börger, MD Holton, R Jafari-Marandi… - Ecological …, 2022 - Elsevier
Many studies of animal distributions use habitat and climactic variables to explain patterns of
observed space use. However, without behavioral information, we can only speculate as to …

Characterizing and forecasting the responses of tropical forest leaf phenology to El Nino by machine learning algorithms

T Lamjiak, R Kaewthongrach, B Sirinaovakul… - Plos one, 2021 - journals.plos.org
Climate change and global warming have serious adverse impacts on tropical forests. In
particular, climate change may induce changes in leaf phenology. However, in tropical dry …

From Seeing to Recognising–an Extended Self-Organizing Map for Human Postures Identification

X He, T Zielinska, V Dutta… - IEEE Robotics and …, 2024 - ieeexplore.ieee.org
The letter presents a dedicated method for recognizing human postures using classification
and clustering options. The ultimate goal of the research is to recognise human actions …

Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness

A Shalaginov, K Franke - Applied Soft Computing, 2017 - Elsevier
Abstract Analysis of large-scale traffic dumps in Network Forensics can be a complex and
non-trivial problem. This is an important step in collecting evidences and making threat …

Intelligence in digital forensics process

IY Adam, C Varol - … on Digital Forensics and Security (ISDFS), 2020 - ieeexplore.ieee.org
Digital forensics is the digital equivalence of traditional crime investigations that leverages
digital technologies to facilitate criminal investigations. The expertise and previous …

Understanding neuro-fuzzy on a class of multinomial malware detection problems

A Shalaginov, LS Grini, K Franke - 2016 International Joint …, 2016 - ieeexplore.ieee.org
Malware classification has become an important task in protection of privacy and sensitive
information from being stolen or modified. A number of malware categories and families …

Self‐organizing maps as a dimension reduction approach for spatial global sensitivity analysis visualization

S Şalap‐Ayça - Transactions in GIS, 2022 - Wiley Online Library
Spatial global sensitivity analysis (SGSA) reveals and ranks the input–output relation in
spatial models. The SGSA output is twofold:(1) first‐order effects which are the linear …