Automatic Malware Detection Using Deep Learning Based on Static Analysis
暂无分享,去创建一个
[1] Mark Stamp,et al. Hidden Markov models for malware classification , 2015, Journal of Computer Virology and Hacking Techniques.
[2] Eul Gyu Im,et al. Fast malware family detection method using control flow graphs , 2011, RACS.
[3] Yogesh Kumar Meena,et al. Byte Level n–Gram Analysis for Malware Detection , 2011 .
[4] Hirofumi Yamaki,et al. A Malware Classification Method Based on Similarity of Function Structure , 2012, 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet.
[5] V. V. Strelkov,et al. A new similarity measure for histogram comparison and its application in time series analysis , 2008, Pattern Recognit. Lett..
[6] Claudia Eckert,et al. Feature Selection and Extraction for Malware Classification , 2015, J. Inf. Sci. Eng..
[7] Konstantin Berlin,et al. Deep neural network based malware detection using two dimensional binary program features , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).
[8] Eul Gyu Im,et al. Malware analysis method using visualization of binary files , 2013, RACS.
[9] Razvan Pascanu,et al. Malware classification with recurrent networks , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[10] Srinivas Mukkamala,et al. Image visualization based malware detection , 2013, 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[11] Piyush Kumar Shukla,et al. Improved Malware Detection Technique Using Ensemble Based Classifier and Graph Theory , 2015, 2015 IEEE International Conference on Computational Intelligence & Communication Technology.
[12] Bo Yu,et al. Automatic malware classification and new malware detection using machine learning , 2017, Frontiers of Information Technology & Electronic Engineering.
[13] Roberto Antonio Vázquez,et al. Malware Classification Using Euclidean Distance and Artificial Neural Networks , 2013, 2013 12th Mexican International Conference on Artificial Intelligence.
[14] Maxim Anikeev,et al. Classification of polymorphic and metamorphic malware samples based on their behavior , 2012, SIN '12.
[15] Eul Gyu Im,et al. Malware analysis using visualized images and entropy graphs , 2014, International Journal of Information Security.
[16] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[17] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..