Learning to detect and classify malicious executables in the wild
From MaRDI portal
Publication:3174061
Recommendations
- Mal-ID: automatic malware detection using common segment analysis and meta-features
- Improving malware detection by applying multi-inducer ensemble
- Malware detection using machine learning
- Comparison of feature selection and classification algorithms in identifying malicious executables
- scientific article; zbMATH DE number 2120014
Cited in
(12)- Phishing detection with popular search engines: simple and effective
- Comparison of feature selection and classification algorithms in identifying malicious executables
- Detection of unknown computer worms based on behavioral classification of the host
- Greedy attack and Gumbel attack: generating adversarial examples for discrete data
- Boosting scalability in anomaly-based packed executable filtering
- Mal-ID: automatic malware detection using common segment analysis and meta-features
- Stochastic identification of malware with dynamic traces
- Improving malware detection by applying multi-inducer ensemble
- Probabilistic suffix models for API sequence analysis of windows XP applications
- Joint detection of malicious domains and infected clients
- Malware detection using machine learning
- scientific article; zbMATH DE number 2120014 (Why is no real title available?)
This page was built for publication: Learning to detect and classify malicious executables in the wild
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3174061)