Malware Classification using Long Short-term Memory Models

[1]  M. Stamp,et al.  A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification , 2020, Malware Analysis Using Artificial Intelligence and Deep Learning.

[2]  M. Stamp,et al.  An Empirical Analysis of Image-Based Learning Techniques for Malware Classification , 2020, Malware Analysis Using Artificial Intelligence and Deep Learning.

[3]  Mirella Lapata,et al.  Long Short-Term Memory-Networks for Machine Reading , 2016, EMNLP.

[4]  Ashwini Mujumdar,et al.  Analysis of Signature-Based and Behavior-Based Anti-Malware Approaches , 2013 .

[5]  Rabia Tahir,et al.  A Study on Malware and Malware Detection Techniques , 2018 .

[6]  Juan Caballero,et al.  The MALICIA dataset: identification and analysis of drive-by download operations , 2014, International Journal of Information Security.

[7]  Lukás Burget,et al.  Extensions of recurrent neural network language model , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[8]  Mohit Sewak,et al.  Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection , 2018, 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[9]  Jack W. Stokes,et al.  Malware classification with LSTM and GRU language models and a character-level CNN , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[10]  Mark Stamp,et al.  Introduction to Machine Learning with Applications in Information Security , 2017 .

[11]  N. Chowdhury,et al.  A comparative analysis of Feed-forward neural network & Recurrent Neural network to detect intrusion , 2008, 2008 International Conference on Electrical and Computer Engineering.

[12]  Zhiyong Cui,et al.  Deep Bidirectional and Unidirectional LSTM Recurrent Neural Network for Network-wide Traffic Speed Prediction , 2018, ArXiv.

[13]  Mark Stamp,et al.  Convolutional neural networks and extreme learning machines for malware classification , 2020, Journal of Computer Virology and Hacking Techniques.

[14]  Jeffrey Dean,et al.  Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.

[15]  Jinbo Zhang,et al.  DeepMal: A CNN-LSTM Model for Malware Detection Based on Dynamic Semantic Behaviours , 2020, 2020 International Conference on Computer Information and Big Data Applications (CIBDA).

[16]  Anand Sharma,et al.  Malware Detection & Classification using Machine Learning , 2020, 2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3).

[17]  Neda Tavakoli,et al.  Modeling Genome Data Using Bidirectional LSTM , 2019, 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC).

[18]  Preeti Mishra,et al.  VMAnalyzer: Malware Semantic Analysis using Integrated CNN and Bi-Directional LSTM for Detecting VM-level Attacks in Cloud , 2019, 2019 Twelfth International Conference on Contemporary Computing (IC3).

[19]  M. Stamp Alphabet Soup of Deep Learning Topics , 2019 .

[20]  Renjie Lu,et al.  Malware Detection with LSTM using Opcode Language , 2019, ArXiv.