Learning to detect and classify malicious executables in the wild
From MaRDI portal
Publication:3174061
zbMATH Open1222.68236MaRDI QIDQ3174061FDOQ3174061
Authors: Zico Kolter, Marcus A. Maloof
Publication date: 12 October 2011
Full work available at URL: http://www.jmlr.org/papers/v7/kolter06a.html
Recommendations
- Mal-ID: automatic malware detection using common segment analysis and meta-features
- Improving malware detection by applying multi-inducer ensemble
- Malware detection using machine learning
- Comparison of feature selection and classification algorithms in identifying malicious executables
- scientific article; zbMATH DE number 2120014
Learning and adaptive systems in artificial intelligence (68T05) Computer system organization (68M99)
Cited In (12)
- Improving malware detection by applying multi-inducer ensemble
- Title not available (Why is that?)
- Comparison of feature selection and classification algorithms in identifying malicious executables
- Detection of unknown computer worms based on behavioral classification of the host
- Boosting scalability in anomaly-based packed executable filtering
- Stochastic identification of malware with dynamic traces
- Mal-ID: automatic malware detection using common segment analysis and meta-features
- Joint detection of malicious domains and infected clients
- Greedy attack and Gumbel attack: generating adversarial examples for discrete data
- Probabilistic suffix models for API sequence analysis of windows XP applications
- Malware detection using machine learning
- Phishing detection with popular search engines: simple and effective
This page was built for publication: Learning to detect and classify malicious executables in the wild
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3174061)