Related references
Note: Only part of the references are listed.On the Effectiveness of Image Processing Based Malware Detection Techniques
C. Bijitha et al.
CYBERNETICS AND SYSTEMS (2022)
A two-stage deep learning framework for image-based android malware detection and variant classification
Pooja Yadav et al.
COMPUTATIONAL INTELLIGENCE (2022)
Malware Detection Issues, Challenges, and Future Directions: A Survey
Faitouri A. Aboaoja et al.
APPLIED SCIENCES-BASEL (2022)
Auditing static machine learning anti-Malware tools against metamorphic attacks
Daniel Gibert et al.
COMPUTERS & SECURITY (2021)
Generative Adversarial Networks: A Survey Toward Private and Secure Applications
Zhipeng Cai et al.
ACM COMPUTING SURVEYS (2021)
Malware detection employed by visualization and deep neural network
Anson Pinhero et al.
COMPUTERS & SECURITY (2021)
Optimal feature configuration for dynamic malware detection
David Escudero Garcia et al.
COMPUTERS & SECURITY (2021)
Image-Based malware classification using ensemble of CNN architectures (IMCEC)
Danish Vasan et al.
COMPUTERS & SECURITY (2020)
IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture
Danish Vasan et al.
COMPUTER NETWORKS (2020)
Deep learning for image-based mobile malware detection
Francesco Mercaldo et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2020)
Review of Artificial Intelligence Adversarial Attack and Defense Technologies
Shilin Qiu et al.
APPLIED SCIENCES-BASEL (2019)
MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics
Weijie Han et al.
COMPUTERS & SECURITY (2019)
Enhanced Approach to Detect Malicious VBScript Files Based on Data Mining Techniques
Doaa Wael et al.
9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018) (2018)
A comparison of static, dynamic, and hybrid analysis for malware detection
Anusha Damodaran et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2017)
Malware target recognition via static heuristics
T. Dube et al.
COMPUTERS & SECURITY (2012)