4.7 Article

Impact of benign sample size on binary classification accuracy

Related references

Note: Only part of the references are listed.
Article Chemistry, Multidisciplinary

Impact of Dataset Size on Classification Performance: An Empirical Evaluation in the Medical Domain

Alhanoof Althnian et al.

Summary: The study investigates the impact of dataset size on the overall performance of supervised classification models in the medical domain, finding that classifier performance depends on how well the dataset represents the original distribution rather than just its size. AB and NB are the most robust models for limited medical data, followed by SVM, while DT is the least robust. Interestingly, a robust machine learning model for a limited dataset does not necessarily mean it performs best compared to other models.

APPLIED SCIENCES-BASEL (2021)

Article Computer Science, Information Systems

Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets

Xi Xiao et al.

Summary: Phishing websites are a serious threat to users, and various methods, such as combining CNN and LSTM, have been proposed to identify them. The application of self-attention mechanism in deep learning tasks like NLP has also shown promise in improving accuracy for phishing websites detection.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

Static detection of malicious PowerShell based on word embeddings

Mamoru Mimura et al.

Summary: While traditional malware relies on executables to function, fileless malware resides in memory to evade traditional detection methods. PowerShell provides an ideal cover for attackers, but detecting malicious PowerShell has been a challenge. This study proposes a static method based on word embeddings to detect malicious PowerShell effectively, achieving high F1 scores in practical environments.

INTERNET OF THINGS (2021)

Article Computer Science, Information Systems

Machine Learning for Misuse-Based Network Intrusion Detection: Overview, Unified Evaluation and Feature Choice Comparison Framework

Laurens Le Jeune et al.

Summary: Network intrusion detection systems are essential for protecting advanced communication networks. Machine learning algorithms and two new evaluation metrics have been proposed to improve performance and reliability. A workflow for converting raw packet flows into machine learning features allows for quick comparison of algorithms across different datasets.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Adjusting lexical features of actual proxy logs for intrusion detection

Mamoru Mimura

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Resolving the imbalance issue in short messaging service spam dataset using cost-sensitive techniques

Lee Peng Lim et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Using fake text vectors to improve the sensitivity of minority class for macro malware detection

Mamoru Mimura

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

The arms race: Adversarial search defeats entropy used to detect malware

Hector D. Menendez et al.

EXPERT SYSTEMS WITH APPLICATIONS (2019)

Article Computer Science, Information Systems

Deep learning at the shallow end: Malware classification for non-domain experts

Quan Le et al.

DIGITAL INVESTIGATION (2018)

Article Computer Science, Artificial Intelligence

G3MD: Mining frequent opcode sub-graphs for metamorphic malware detection of existing families

Alireza Khalilian et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Article Computer Science, Information Systems

Availability of datasets for digital forensics - And what is missing

Cinthya Grajeda et al.

DIGITAL INVESTIGATION (2017)

Article Computer Science, Information Systems

Addressing the class imbalance problem in Twitter spam detection using ensemble learning

Shigang Liu et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

A framework for metamorphic malware analysis and real-time detection

Shahid Alam et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Information Systems

SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging

Yanfang Ye et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2009)

Article Computer Science, Artificial Intelligence

Classification of packed executables for accurate computer virus detection

Roberto Perdisci et al.

PATTERN RECOGNITION LETTERS (2008)

Article Computer Science, Information Systems

Opcodes as predictor for malware

Daniel Bilar

INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS (2007)

Article Computer Science, Information Systems

Malware phylogeny generation using permutations of code

Md. Enamul Karim et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2005)

Article Ecology

Effects of sample size on accuracy of species distribution models

DRB Stockwell et al.

ECOLOGICAL MODELLING (2002)