A semantic malware detection model based on the GMDH neural networks
暂无分享,去创建一个
[1] Giovanni Squillero,et al. The Maximum Common Subgraph Problem: A Parallel and Multi-Engine Approach , 2020, Comput..
[2] Seunghyun Park,et al. Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms , 2020 .
[3] Rajeswari Mukesh,et al. Detection of Malware Attacks on Virtual Machines for a Self-Heal Approach in Cloud Computing using VM Snapshots , 2018, Journal of Communications Software and Systems.
[4] Dejan S. Milojicic,et al. A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade , 2018 .
[5] Yuval Elovici,et al. Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments , 2020, Neural Networks.
[6] Wei Zhang,et al. Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware , 2016, IEEE Transactions on Information Forensics and Security.
[7] Huda Karajeh,et al. Privacy and Security Issues of Cloud Computing Environment , 2016 .
[8] A. Adamian,et al. Estimation of contact heat transfer between curvilinear contacts using inverse method and group method of data handling (GMDH)-type neural networks , 2020 .
[9] Sanjay Chakraborty,et al. Cloud Based Malware Detection Technique , 2016, FICTA.
[10] Rajkumar Buyya,et al. Brownout Approach for Adaptive Management of Resources and Applications in Cloud Computing Systems , 2019, ACM Comput. Surv..
[11] Rita Almeida Ribeiro,et al. Normalization Techniques for Multi-Criteria Decision Making: Analytical Hierarchy Process Case Study , 2016, DoCEIS.
[12] Liang Xiao,et al. Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.
[13] Bo Li,et al. Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach , 2017, Comput. Secur..
[14] Vijay Varadharajan,et al. Intrusion detection techniques in cloud environment: A survey , 2017, J. Netw. Comput. Appl..
[15] Preeti Mishra,et al. KVMInspector: KVM Based introspection approach to detect malware in cloud environment , 2020, J. Inf. Secur. Appl..
[16] Muttukrishnan Rajarajan,et al. Employing Program Semantics for Malware Detection , 2015, IEEE Transactions on Information Forensics and Security.
[17] Latifa Ben Arfa Rabai,et al. A Security Framework for Secure Cloud Computing Environments , 2016, Int. J. Cloud Appl. Comput..
[18] Giovanni Squillero,et al. The Maximum Common Subgraph Problem: A Portfolio Approach , 2019, ArXiv.
[19] Rajkumar Buyya,et al. CloudEyes: Cloud‐based malware detection with reversible sketch for resource‐constrained internet of things (IoT) devices , 2017, Softw. Pract. Exp..
[20] Rajkumar Buyya,et al. Augmentation Techniques for Mobile Cloud Computing , 2018, ACM Comput. Surv..
[21] Syed Waqar Jaffry,et al. Data mining for smart legal systems , 2019, Comput. Electr. Eng..
[22] Andres Navarro Cadavid,et al. Machine learning classifiers for android malware analysis , 2016, 2016 IEEE Colombian Conference on Communications and Computing (COLCOM).
[23] Abdelouahid Derhab,et al. Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues , 2020, Knowl. Based Syst..
[24] Shedden Masupe,et al. Analysis of internet of things malware using image texture features and machine learning techniques , 2020, Internet Things.
[25] Ram Mahesh Yadav,et al. Effective analysis of malware detection in cloud computing , 2019, Comput. Secur..