scispace - formally typeset
M

M. Zubair Shafiq

Researcher at National University of Computer and Emerging Sciences

Publications -  15
Citations -  854

M. Zubair Shafiq is an academic researcher from National University of Computer and Emerging Sciences. The author has contributed to research in topics: Malware & Executable. The author has an hindex of 11, co-authored 15 publications receiving 769 citations.

Papers
More filters
Book ChapterDOI

PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime

TL;DR: The results show that the extracted features are robust to different packing techniques and PE-Miner is also resilient to majority of crafty evasion strategies.
Proceedings ArticleDOI

Malware detection using statistical analysis of byte-level file content

TL;DR: This paper proposes a novel malware detection technique which is based on the analysis of byte-level file content, which has the potential to detect previously unknown and zero-day malware.
Proceedings ArticleDOI

Using spatio-temporal information in API calls with machine learning algorithms for malware detection

TL;DR: In this paper, the authors use statistical features extracted from both spatial arguments and temporal information available in Windows API calls to detect run-time intrusion or malware detection techniques, and provide this composite feature set as an input to standard machine learning algorithms.
Book ChapterDOI

Embedded Malware Detection Using Markov n-Grams

TL;DR: It is shown that the entropy rate of Markov n-grams gets significantly perturbed at malcode embedding locations, and therefore can act as a robust feature for embedded malware detection.
Book ChapterDOI

Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets

TL;DR: In this article, a comprehensive evaluation of a set of diverse machine learning schemes on a number of biomedical datasets is presented, where the authors follow a four step evaluation methodology: (1) preprocessing the datasets to remove any redundancy, (2) classification of the datasets using six different machine learning algorithms; Naive Bayes (probabilistic), multi-layer perceptron (neural network), SMO (support vector machine), IBk (instance based learner), J48 (decision tree) and RIPPER (rule-based induction), and combining the best