Related references
Note: Only part of the references are listed.The rise of machine learning for detection and classification of malware: Research developments, trends and challenges
Daniel Gibert et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers
Wonjun Lee et al.
2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020) (2020)
KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object
Hojoon Lee et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
TKRD: Trusted kernel rootkit detection for cybersecurity of VMs based on machine learning and memory forensic analysis
Xiao Wang et al.
MATHEMATICAL BIOSCIENCES AND ENGINEERING (2019)
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
Donghai Tian et al.
IEEE ACCESS (2019)
Early-stage malware prediction using recurrent neural networks
Matilda Rhode et al.
COMPUTERS & SECURITY (2018)
A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions
Ethan M. Rudd et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
Adversarial Examples for Malware Detection
Kathrin Grosse et al.
COMPUTER SECURITY - ESORICS 2017, PT II (2017)
Kernel Malware Core Implementation: A Survey
Li XiangYu et al.
2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (2015)
Back to Static Analysis for Kernel-Level Rootkit Detection
Seyyedeh Atefeh Musavi et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)