A Method for Windows Malware Detection Based on Deep Learning

[1]  Mark Stamp,et al.  A comparison of static, dynamic, and hybrid analysis for malware detection , 2015, Journal of Computer Virology and Hacking Techniques.

[2]  Meikang Qiu,et al.  Deep Residual Learning-Based Enhanced JPEG Compression in the Internet of Things , 2021, IEEE Transactions on Industrial Informatics.

[3]  Joohan Lee,et al.  Detecting Trojans Using Data Mining Techniques , 2008, IMTIC.

[4]  Zhihui Lu,et al.  Selective encryption on ECG data in body sensor network based on supervised machine learning , 2020, Inf. Fusion.

[5]  Shouhuai Xu,et al.  VulDeePecker: A Deep Learning-Based System for Vulnerability Detection , 2018, NDSS.

[6]  Jingfeng Xue,et al.  Malware Visualization for Fine-Grained Classification , 2018, IEEE Access.

[7]  Meikang Qiu,et al.  A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT , 2021, IEEE Transactions on Cloud Computing.

[8]  Mamoun Alazab,et al.  Towards Understanding Malware Behaviour by the Extraction of API Calls , 2010, 2010 Second Cybercrime and Trustworthy Computing Workshop.

[9]  Claudio Carpineto,et al.  A Survey of Automatic Query Expansion in Information Retrieval , 2012, CSUR.

[10]  B. S. Manjunath,et al.  Malware images: visualization and automatic classification , 2011, VizSec '11.

[11]  S. Sitharama Iyengar,et al.  A Survey on Malware Detection Using Data Mining Techniques , 2017, ACM Comput. Surv..

[12]  Christopher Krügel,et al.  A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.

[13]  Christopher Krügel,et al.  Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[14]  Zhu-xi Zhang Research and implementation of trace capture technique-based on aspect-oriented programming: Research and implementation of trace capture technique-based on aspect-oriented programming , 2008 .

[15]  Rui Li,et al.  A Behavior-Based Approach for Malware Detection , 2017, IFIP Int. Conf. Digital Forensics.

[16]  Wei Huang,et al.  A Shellcode Detection Method Based on Full Native API Sequence and Support Vector Machine , 2017 .

[17]  Jon Barker,et al.  Malware Detection by Eating a Whole EXE , 2017, AAAI Workshops.

[18]  Mohd Aizaini Maarof,et al.  Malware behavior image for malware variant identification , 2014, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).

[19]  Yang Wang,et al.  Malware Classification with Deep Convolutional Neural Networks , 2018, 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).

[20]  Chandrasekar Ravi,et al.  Malware Detection using Windows Api Sequence and Machine Learning , 2012 .

[21]  Robert Lyda,et al.  Using Entropy Analysis to Find Encrypted and Packed Malware , 2007, IEEE Security & Privacy.

[22]  S. Sitharama Iyengar,et al.  Data-Driven Techniques in Disaster Information Management , 2017, ACM Comput. Surv..