4.5 Article

Malware classification for the cloud via semi-supervised transfer learning

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

MalInsight: A systematic profiling based malware detection framework

Weijie Han et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Information Systems

An Adaptive Ensemble Machine Learning Model for Intrusion Detection

Xianwei Gao et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Malware identification using visualization images and deep learning

Sang Ni et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Deep learning at the shallow end: Malware classification for non-domain experts

Quan Le et al.

DIGITAL INVESTIGATION (2018)

Article Automation & Control Systems

Detection of Malicious Code Variants Based on Deep Learning

Zhihua Cui et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

Malware Visualization for Fine-Grained Classification

Jianwen Fu et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Towards privacy preserving threat intelligence

Sashank Dara et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)

Article Computer Science, Theory & Methods

A Survey on Malware Detection Using Data Mining Techniques

Yanfang Ye et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Information Systems

Hidost: a static machine-learning-based detector of malicious files

Nedim Srndic et al.

EURASIP JOURNAL ON INFORMATION SECURITY (2016)

Article Computer Science, Information Systems

Opcode sequences as representation of executables for data-mining-based unknown malware detection

Igor Santos et al.

INFORMATION SCIENCES (2013)

Article Computer Science, Artificial Intelligence

A Survey on Transfer Learning

Sinno Jialin Pan et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2010)

Article Computer Science, Information Systems

A scalable multi-level feature extraction technique to detect malicious executables

Mohammad M. Masud et al.

INFORMATION SYSTEMS FRONTIERS (2008)

Article Computer Science, Information Systems

Using entropy analysis to find encrypted and packed malware

Robert Lyda et al.

IEEE SECURITY & PRIVACY (2007)

Article Computer Science, Artificial Intelligence

Inference for the generalization error

C Nadeau et al.

MACHINE LEARNING (2003)