Related references
Note: Only part of the references are listed.MalInsight: A systematic profiling based malware detection framework
Weijie Han et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)
An Adaptive Ensemble Machine Learning Model for Intrusion Detection
Xianwei Gao et al.
IEEE ACCESS (2019)
Malware identification using visualization images and deep learning
Sang Ni et al.
COMPUTERS & SECURITY (2018)
Deep learning at the shallow end: Malware classification for non-domain experts
Quan Le et al.
DIGITAL INVESTIGATION (2018)
Detection of Malicious Code Variants Based on Deep Learning
Zhihua Cui et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Malware Visualization for Fine-Grained Classification
Jianwen Fu et al.
IEEE ACCESS (2018)
Towards privacy preserving threat intelligence
Sashank Dara et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)
A Survey on Malware Detection Using Data Mining Techniques
Yanfang Ye et al.
ACM COMPUTING SURVEYS (2017)
Hidost: a static machine-learning-based detector of malicious files
Nedim Srndic et al.
EURASIP JOURNAL ON INFORMATION SECURITY (2016)
Opcode sequences as representation of executables for data-mining-based unknown malware detection
Igor Santos et al.
INFORMATION SCIENCES (2013)
A Survey on Transfer Learning
Sinno Jialin Pan et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2010)
A scalable multi-level feature extraction technique to detect malicious executables
Mohammad M. Masud et al.
INFORMATION SYSTEMS FRONTIERS (2008)
Using entropy analysis to find encrypted and packed malware
Robert Lyda et al.
IEEE SECURITY & PRIVACY (2007)
Inference for the generalization error
C Nadeau et al.
MACHINE LEARNING (2003)