Parallelization of Machine Learning Applied to Call Graphs of Binaries for Malware Detection
暂无分享,去创建一个
John Cavazos | John Howe | Tristan Vanderbruggen | Zachary Pearson | Lifan Xu | Robert Searles | William Killian | Joshua Simmons | Teague Forren | Corey Shannon | Lifan Xu | J. Cavazos | W. Killian | T. Vanderbruggen | R. Searles | Joshua Simmons | Zachary Pearson | Teague Forren | John Howe | Corey Shannon | John Cavazos | Robert Searles
[1] Hussein L. Hussein,et al. Static Analysis Based Behavioral API for Malware Detection using Markov Chain , 2014 .
[2] Michael Garland,et al. Efficient Sparse Matrix-Vector Multiplication on CUDA , 2008 .
[3] Curtis B. Storlie,et al. Graph-based malware detection using dynamic analysis , 2011, Journal in Computer Virology.
[4] Nello Cristianini,et al. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .
[5] John Cavazos,et al. Using graph-based program characterization for predictive modeling , 2012, CGO '12.
[6] P. Harmya,et al. Malware detection using assembly code and control flow graph optimization , 2010, A2CWiC '10.
[7] Konstantin Berlin,et al. Deep neural network based malware detection using two dimensional binary program features , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).
[8] Andrew Honig,et al. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software , 2012 .
[9] Konrad Rieck,et al. Structural detection of android malware using embedded call graphs , 2013, AISec.
[10] Chao Yang,et al. DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications , 2014, ESORICS.
[11] Wei Wang,et al. Parallelization of Shortest Path Graph Kernels on Multi-Core CPUs and GPUs , 2013 .
[12] Kunle Olukotun,et al. Efficient Parallel Graph Exploration on Multi-Core CPU and GPU , 2011, 2011 International Conference on Parallel Architectures and Compilation Techniques.
[13] Karsten M. Borgwardt,et al. Fast subtree kernels on graphs , 2009, NIPS.
[14] A. Atiya,et al. Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond , 2005, IEEE Transactions on Neural Networks.
[15] Tatsuya Akutsu,et al. Extensions of marginalized graph kernels , 2004, ICML.
[16] Yoseba K. Penya,et al. N-grams-based File Signatures for Malware Detection , 2009, ICEIS.
[17] Alice Zheng,et al. Evaluating Machine Learning Models , 2019, Machine Learning in the AWS Cloud.
[18] Hans-Peter Kriegel,et al. Shortest-path kernels on graphs , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[19] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).