Related references
Note: Only part of the references are listed.Similarity hash based scoring of portable executable files for efficient malware detection in IoT
Anitta Patience Namanya et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Deep learning based Sequential model for malware analysis using Windows exe API Calls
Ferhat Ozgur Catak et al.
PEERJ COMPUTER SCIENCE (2020)
Static malware clustering using enhanced deep embedding method
Chee Keong Ng et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)
Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning
Cangshuai Wu et al.
ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY (2018)
Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis
A. V. Kozachok et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2018)
Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems
Ming Wan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Malware Detection with Deep Neural Network Using Process Behavior
Shun Tobiyama et al.
PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2 (2016)
MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing
Phani Vadrevu et al.
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features
Mohamed Belaoued et al.
COMPUTER SCIENCE AND ITS APPLICATIONS, CIIA 2015 (2015)
MOSES: Supporting and Enforcing Security Profiles on Smartphones
Yury Zhauniarovich et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2014)
Classification of malware based on integrated static and dynamic features
Rafiqul Islam et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection
Mojtaba Eskandari et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2013)
A Survey on Automated Dynamic Malware-Analysis Techniques and Tools
Manuel Egele et al.
ACM COMPUTING SURVEYS (2012)
Signature Tree Generation for Polymorphic Worms
Yong Tang et al.
IEEE TRANSACTIONS ON COMPUTERS (2011)
RUSBoost: A Hybrid Approach to Alleviating Class Imbalance
Chris Seiffert et al.
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS (2010)
Watermarking, tamper-proofing, and obfuscation - Tools for software protection
CS Collberg et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2002)
An efficient k-means clustering algorithm:: Analysis and implementation
T Kanungo et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2002)