Follow
S. Ndichu
Title
Cited by
Cited by
Year
A machine learning approach to detection of JavaScript-based attacks using AST features and paragraph vectors
S Ndichu, S Kim, S Ozawa, T Misu, K Makishima
Applied Soft Computing 84, 105721, 2019
732019
Deobfuscation, unpacking, and decoding of obfuscated malicious JavaScript for machine learning models detection performance improvement
S Ndichu, S Kim, S Ozawa
CAAI Transactions on Intelligence Technology 5 (3), 184-192, 2020
452020
Combat security alert fatigue with AI-assisted techniques
T Ban, N Samuel, T Takahashi, D Inoue
Cyber Security Experimentation and Test Workshop, 9-16, 2021
392021
A machine learning approach to malicious JavaScript detection using fixed length vector representation
S Ndichu, S Ozawa, T Misu, K Okada
2018 International Joint Conference on Neural Networks (IJCNN), 1-8, 2018
332018
A remote access security model based on vulnerability management
S Ndichu, S McOyowo, H Okoyo, C Wekesa
Modern Education & Computer science Press, 2020
232020
Deobfuscation, unpack-465 ing, and decoding of obfuscated malicious JavaScript for 466 machine learning models detection performance improve-467 ment [J]
S Ndichu, S Kim, S Ozawa
CAAI Transactions on Intelligence Technology 468 (5), 3, 2020
13*2020
A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs
S Ndichu, T Ban, T Takahashi, D Inoue
2021 IEEE International Conference on Big Data (Big Data), 2119-2127, 2021
92021
Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response
T Ban, T Takahashi, S Ndichu, D Inoue
Applied Sciences 13 (11), 6610, 2023
82023
AI-Assisted Security Alert Data Analysis with Imbalanced Learning Methods
S Ndichu, T Ban, T Takahashi, D Inoue
Applied Sciences 13 (3), 1977, 2023
72023
A domains approach to remote access logical vulnerabilities classification
S Ndichu, S McOyowo, H Okoyo, C Wekesa
MECS: http://www. mecspress. org/ijcnis/ijcnis-v11-n11/IJCNIS-V11-N11-5. pdf., 2019
72019
Detecting Web-Based Attacks with SHAP and Tree Ensemble Machine Learning Methods
S Ndichu, S Kim, S Ozawa, T Ban, T Takahashi, D Inoue
Applied Sciences 12 (1), 60, 2021
62021
Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks
S Ndichu, T Ban, T Takahashi, D Inoue
2022 17th Asia Joint Conference on Information Security (AsiaJCIS), 1-7, 2022
52022
A Review of Security Vulnerabilities, Controls and Models in Networked Environments
S Ndichu, S McOyowo, C Wekesa
International Journal of Latest Research in Engineering and Technology …, 2016
32016
Critical-Threat-Alert Detection using Online Machine Learning
S Ndichu, T Ban, T Takahashi, D Inoue
2022 IEEE International Conference on Big Data (Big Data), 3007-3014, 2022
22022
Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods
S Ndichu, S McOyowo, H Okoyo, C Wekesa
International Journal of Computer Network and Information Security 15 (2), 48-61, 2023
12023
Web Based Integrated Evaluation Framework for Information Security Preparedness in Law Enforcement Agencies
S Ndichu, P Ogao
International Journal of Computer Science and Information Security (IJCSIS …, 2016
12016
Machine Learning–Based Security Alert Screening with Focal Loss
S Ndichu, T Ban, T Takahashi, D Inoue
2023 IEEE International Conference on Big Data (BigData), 3043-3052, 2023
2023
Poster: A Machine Learning Model Performance Improvement Approach to Detection of Obfuscated JavaScript-based Attacks
S Ndichu, S Kim, S Ozawa
Network and Distributed Systems Security (NDSS) Symposium 2020, 2020
2020
A Review of Information Security Preparedness Evaluation Mechanisms in Law Enforcement Agencies
S Ndichu, P Ogao
IOSR Journal of Computer Engineering (IOSR-JCE) 18 (4), 58-63, 2016
2016
Web based integrated evaluation framework for information security preparedness in law enforcement agencies
S Ndichu
KCA UNIVERSITY, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–20