- eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
- Machine Learning DDoS Detection for Consumer Internet of Things Devices
- Detecting Malicious PowerShell Commands using Deep Neural Networks
- EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models
- Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things
- Practical Secure Aggregation for Privacy-Preserving Machine Learning
- Machine Learning In Cybersecurity: A Guide
- Anagram: A Content Anomaly Detector Resistant to Mimicry Attack
- Investigation of Malicious Portable Executable File Detection on the Network using Supervised Learning Techniques
- CAMP: Content-Agnostic Malware Protection
- Machine Learning: A Threat Hunting Reality Check
- Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers
- EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
- Applications of Machine Learning in Cyber Security
- From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware
- Detecting Malware Domains at the Upper DNS Hierarchy
- 4 Ways Machine Learning Is Powering Smarter Threat Intelligence
- Nazca: Detecting Malware Distribution in Large-Scale Networks
- Building a Dynamic Reputation System for DNS
- Outside the Closed World: On Using Machine Learning For Network Intrusion Detection
- DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
- Anomalous Payload-based Network Intrusion Detection
- Polonium: Tera-Scale Graph Mining for Malware Detection
- A state‑of‑the‑art survey of malware detection approaches using data mining techniques
- Dimension Reduction in Network Attacks Detection Systems
- A Survey of Deep Learning Methods for Cyber Security
- Machine Learning and Cyber Security
- On the Effectiveness of Machine and Deep Learning for Cyber Security
- A Study of Cyber Security using Machine Learning Techniques
- Machine Learning for Cyber Defense and Attack
- Machine Learning Algorithms in Cyber Security
- Deep Reinforcement Learning for Cyber Security
- A short review on Applications of Deep learning for Cyber security
- Generations of Machine Learning in Cybersecurity
- A User-centric Machine Learning Framework For Cybersecurity Operations Center
- The Rise Of Machine Learning In Cybersecurity
- SoK: Security and Privacy in Machine Learning
manjunath5496/Cyber-Security-ML-Papers
"Physics is the only profession in which prophecy is not only accurate but routine."― Neil deGrasse Tyson