4.6 Article

PROUD-MAL: static analysis-based progressive framework for deep unsupervised malware classification of windows portable executable

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Similarity hash based scoring of portable executable files for efficient malware detection in IoT

Anitta Patience Namanya et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Artificial Intelligence

Deep learning based Sequential model for malware analysis using Windows exe API Calls

Ferhat Ozgur Catak et al.

PEERJ COMPUTER SCIENCE (2020)

Article Computer Science, Software Engineering

Static malware clustering using enhanced deep embedding method

Chee Keong Ng et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)

Proceedings Paper Telecommunications

Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning

Cangshuai Wu et al.

ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY (2018)

Article Computer Science, Information Systems

Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis

A. V. Kozachok et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2018)

Article Computer Science, Theory & Methods

Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems

Ming Wan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Proceedings Paper Computer Science, Interdisciplinary Applications

Malware Detection with Deep Neural Network Using Process Behavior

Shun Tobiyama et al.

PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2 (2016)

Proceedings Paper Computer Science, Information Systems

MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing

Phani Vadrevu et al.

ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features

Mohamed Belaoued et al.

COMPUTER SCIENCE AND ITS APPLICATIONS, CIIA 2015 (2015)

Article Computer Science, Hardware & Architecture

MOSES: Supporting and Enforcing Security Profiles on Smartphones

Yury Zhauniarovich et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2014)

Review Computer Science, Hardware & Architecture

Classification of malware based on integrated static and dynamic features

Rafiqul Islam et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Computer Science, Information Systems

HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection

Mojtaba Eskandari et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2013)

Article Computer Science, Theory & Methods

A Survey on Automated Dynamic Malware-Analysis Techniques and Tools

Manuel Egele et al.

ACM COMPUTING SURVEYS (2012)

Article Computer Science, Hardware & Architecture

Signature Tree Generation for Polymorphic Worms

Yong Tang et al.

IEEE TRANSACTIONS ON COMPUTERS (2011)

Article Computer Science, Cybernetics

RUSBoost: A Hybrid Approach to Alleviating Class Imbalance

Chris Seiffert et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS (2010)

Article Computer Science, Software Engineering

Watermarking, tamper-proofing, and obfuscation - Tools for software protection

CS Collberg et al.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2002)

Article Computer Science, Artificial Intelligence

An efficient k-means clustering algorithm:: Analysis and implementation

T Kanungo et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2002)