Skip to main content

Showing 1–3 of 3 results for author: Goseva-Popstojanova, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2207.05710  [pdf

    cs.SE cs.LG

    The Untold Impact of Learning Approaches on Software Fault-Proneness Predictions

    Authors: Mohammad Jamil Ahmad, Katerina Goseva-Popstojanova, Robyn R. Lutz

    Abstract: Software fault-proneness prediction is an active research area, with many factors affecting prediction performance extensively studied. However, the impact of the learning approach (i.e., the specifics of the data used for training and the target variable being predicted) on the prediction performance has not been studied, except for one initial work. This paper explores the effects of two learnin… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  2. arXiv:1805.06541  [pdf, other

    cs.CR

    Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics (Extended Version)

    Authors: Robert Bridges, Jarilyn Hernandez Jimenez, Jeffrey Nichols, Katerina Goseva-Popstojanova, Stacy Prowell

    Abstract: This paper presents an experimental design and data analytics approach aimed at power-based malware detection on general-purpose computers. Leveraging the fact that malware executions must consume power, we explore the postulate that malware can be accurately detected via power data analytics. Our experimental design and implementation allow for programmatic collection of CPU power profiles for fi… ▽ More

    Submitted 16 May, 2018; originally announced May 2018.

    Comments: Published version appearing in IEEE TrustCom-18. This version contains more details on mathematics and data collection

  3. arXiv:1705.01977  [pdf, other

    cs.CR

    Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study

    Authors: Jarilyn M. Hernández Jiménez, Jeffrey A. Nichols, Katerina Goseva-Popstojanova, Stacy Prowell, Robert A. Bridges

    Abstract: Malware detection is challenging when faced with automatically generated and polymorphic malware, as well as with rootkits, which are exceptionally hard to detect. In an attempt to contribute towards addressing these challenges, we conducted a proof of concept study that explored the use of power consumption for detection of malware presence in a general-purpose computer. The results of our experi… ▽ More

    Submitted 4 May, 2017; originally announced May 2017.