default search action
Dragos Gavrilut
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian:
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware. Int. J. Inf. Sec. 23(1): 271-297 (2024) - [c33]Radu Stefan Mihalache, Dragos Teodor Gavrilut, Anton Dan Gabriel:
Real-Time Deep Learning-Based Malware Detection Using Static and Dynamic Features. ICAART (3) 2024: 226-234 - [c32]Raul Zaharia, Dragos Gavrilut, Gheorghita Mutu, Dorel Lucanu:
Interactive Assistance in Malware Dissemination Detection and Analysis. SCID@AsiaCCS 2024: 7 - [i1]Raul Zaharia, Dragos Gavrilut, Gheorghita Mutu, Dorel Lucanu:
GView: A Versatile Assistant for Security Researchers. CoRR abs/2404.09058 (2024) - 2023
- [j8]Gheorghe Balan, Ciprian-Alin Simion, Dragos Teodor Gavrilut, Henri Luchian:
Feature mining and classifier selection for API calls-based malware detection. Appl. Intell. 53(23): 29094-29108 (2023) - 2022
- [c31]Ciprian-Alin Simion, Gheorghe Balan, Dragos Teodor Gavrilut:
Using GANs to Improve the Accuracy of Machine Learning Models for Malware Detection. IDEAL 2022: 399-410 - [c30]Gheorghe Balan, Dragos Teodor Gavrilut, Henri Luchian:
Using API Calls for Sequence-Pattern Feature Mining-Based Malware Detection. ISPEC 2022: 233-251 - [c29]Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian:
Detection of MSOffice-Embedded Malware: Feature Mining and Short- vs. Long-Term Performance. ISPEC 2022: 287-305 - [c28]Ciprian-Alin Simion, Gheorghe Balan, Dragos Teodor Gavrilut:
Improving detection of malicious samples by using state-of-the-art adversarial machine learning algorithms. SIN 2022: 1-8 - [c27]Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian:
Evolution of macro VBA obfuscation techniques. SIN 2022: 1-8 - 2021
- [c26]Georgiana Ingrid Stoleru, Dragos Teodor Gavrilut:
A Practical Approach For Malware Identification Based On Anti-Emulation Techniques And Feature To Image Translation. ICCTA 2021: 133-140
2010 – 2019
- 2019
- [c25]Ciprian-Alin Simion, Dragos Teodor Gavrilut, Henri Luchian:
An Adversarial Machine Learning Approach to Evaluate the Robustness of a Security Solution. SYNASC 2019: 148-154 - [c24]Dan-Georgian Marculet, Razvan Benchea, Dragos Teodor Gavrilut:
Methods for Training Neural Networks with Zero False Positives for Malware Detection. SYNASC 2019: 230-236 - 2018
- [j7]Catalin-Valeriu Lita, Doina Cosovan, Dragos Gavrilut:
Anti-emulation trends in modern packers: a survey on the evolution of anti-emulation techniques in UPA packers. J. Comput. Virol. Hacking Tech. 14(2): 107-126 (2018) - [c23]Cristina Vatamanu, Dragos Teodor Gavrilut, George Popoiu:
Adjusting SVMs for Large Data Sets using Balanced Decision Trees. SYNASC 2018: 223-229 - [c22]Marilena Lupascu, Dragos Teodor Gavrilut, Dorel Lucanu:
An Overview of Obfuscation Techniques used by Malware in Visual Basic for Application Scripts. SYNASC 2018: 280-287 - [c21]Adrian Ioan Pîrîu, Mihai Leonte, Nicolae Postolachi, Dragos Teodor Gavrilut:
Optimizing Cleanset Growth by Using Multi-Class Neural Networks. SYNASC 2018: 425-429 - [c20]Georgiana Ingrid Stoleru, Adrian-Stefan Popescu, Dragos Teodor Gavrilut:
Increasing Protection Against Internet Attacks through Contextual Feature Pairing. SYNASC 2018: 430-434 - 2017
- [c19]Cristina Vatamanu, Doina Cosovan, Dragos Gavrilut, Henri Luchian:
Perceptron-Based Ensembles and Binary Decision Trees for Malware Detection. ICANN (2) 2017: 250-259 - [c18]Mihai Leonte, Dragos Teodor Gavrilut, Nicolae Postolachi:
Building a cleanset. An artificial intelligence perspective of identifying network installers. ICCP 2017: 29-36 - [c17]Dan-Georgian Marculet, Dragos Teodor Gavrilut, Razvan Benchea:
GPU memory leveraged for accelerated training using Tensorflow. ICCP 2017: 347-353 - [c16]Andrei Arusoaie, Stefan Ciobaca, Vlad Craciun, Dragos Gavrilut, Dorel Lucanu:
A Comparison of Open-Source Static Analysis Tools for Vulnerability Detection in C/C++ Code. SYNASC 2017: 161-168 - [c15]Dragos Teodor Gavrilut, Anton Dan Gabriel, George Popoiu:
Machine Learning based Malware Detection. How to Balance Memory Footprint with Model Accuracy. SYNASC 2017: 232-238 - 2016
- [j6]Ciprian Oprisa, Dragos Gavrilut, George Cabau:
A scalable approach for detecting plagiarized mobile applications. Knowl. Inf. Syst. 49(1): 143-169 (2016) - [j5]Adrian-Stefan Popescu, Dragos Teodor Gavrilut, Daniel-Ionut Irimia:
A practical approach for clustering large data flows of malicious URLs. J. Comput. Virol. Hacking Tech. 12(1): 37-47 (2016) - [c14]Anton Dan Gabriel, Dragos Teodor Gavrilut, Baetu Ioan Alexandru, Adrian-Stefan Popescu:
Detecting Malicious URLs: A Semi-Supervised Machine Learning System Approach. SYNASC 2016: 233-239 - [c13]Dragos Teodor Gavrilut, George Popoiu, Razvan Benchea:
Identifying DGA-Based Botnets Using Network Anomaly Detection. SYNASC 2016: 292-299 - 2015
- [c12]Razvan Benchea, Dragos Gavrilut, Henri Luchian:
Feature Creation Using Genetic Algorithms for Zero False Positive Malware Classification. EVOLVE 2015: 82-93 - [c11]Adrian-Stefan Popescu, Dumitru-Bogdan Prelipcean, Dragos Teodor Gavrilut:
A Study on Techniques for Proactively Identifying Malicious URLs. SYNASC 2015: 204-211 - [c10]Cristina Vatamanu, Dragos Gavrilut, Razvan Benchea, Henri Luchian:
Feature Extraction Using Genetic Programming with Applications in Malware Detection. SYNASC 2015: 224-231 - [c9]Dumitru-Bogdan Prelipcean, Adrian-Stefan Popescu, Dragos Teodor Gavrilut:
Improving Malware Detection Response Time with Behavior-Based Statistical Analysis Techniques. SYNASC 2015: 232-239 - 2014
- [c8]Razvan Benchea, Dragos Teodor Gavrilut:
Combining Restricted Boltzmann Machine and One Side Perceptron for Malware Detection. ICCS 2014: 93-103 - [c7]Doina Cosovan, Razvan Benchea, Dragos Gavrilut:
A Practical Guide for Detecting the Java Script-Based Malware Using Hidden Markov Models and Linear Classifiers. SYNASC 2014: 236-243 - [c6]Marius Barat, Dumitru-Bogdan Prelipcean, Dragos Teodor Gavrilut:
A Practical Approach on Cleaning-Up Large Data Sets. SYNASC 2014: 280-284 - 2013
- [j4]Marius Barat, Dumitru-Bogdan Prelipcean, Dragos Teodor Gavrilut:
A study on common malware families evolution in 2012. J. Comput. Virol. Hacking Tech. 9(4): 171-178 (2013) - [j3]Cristina Vatamanu, Dragos Gavrilut, Razvan-Mihai Benchea:
Building a practical and reliable classifier for malware detection. J. Comput. Virol. Hacking Tech. 9(4): 205-214 (2013) - [c5]Marius Barat, Dumitru-Bogdan Prelipcean, Dragos Teodor Gavrilut:
An Automatic Updating Perceptron-Based System for Malware Detection. SYNASC 2013: 303-307 - 2012
- [j2]Mihai Cimpoesu, Dragos Gavrilut, Adrian Popescu:
The proactivity of Perceptron derived algorithms in malware detection. J. Comput. Virol. 8(4): 133-140 (2012) - [j1]Cristina Vatamanu, Dragos Gavrilut, Razvan Benchea:
A practical approach on clustering malicious PDF documents. J. Comput. Virol. 8(4): 151-163 (2012) - [c4]Dragos Gavrilut, Razvan Benchea, Cristina Vatamanu:
Practical Optimizations for Perceptron Algorithms in Large Malware Dataset. SYNASC 2012: 240-246 - [c3]Dragos Gavrilut, Razvan Benchea, Cristina Vatamanu:
Optimized Zero False Positives Perceptron Training for Malware Detection. SYNASC 2012: 247-253 - 2011
- [c2]Dragos Gavrilut, Liviu Ciortuz:
Dealing with Class Noise in Large Training Datasets for Malware Detection. SYNASC 2011: 401-407
2000 – 2009
- 2009
- [c1]Dragos Gavrilut, Mihai Cimpoesu, Dan Anton, Liviu Ciortuz:
Malware detection using machine learning. IMCSIT 2009: 735-741
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint