Author:
Digregorio Gabriele,Maccarrone Salvatore,D’Onghia Mario,Gallo Luigi,Carminati Michele,Polino Mario,Zanero Stefano
Publisher
Springer Nature Switzerland
Reference54 articles.
1. Cuckoo (2024). https://github.com/cuckoosandbox/cuckoo
2. Afianian, A., Niksefat, S., Sadeghiyan, B., Baptiste, D.: Malware dynamic analysis evasion techniques: a survey. ACM Comput. Surv. 52(6) (2019). https://doi.org/10.1145/3365001
3. Agrawal, R., Stokes, J.W., Marinescu, M., Selvaraj, K.: Neural sequential malware detection with parameters. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2656–2660. IEEE (2018)
4. Anderson, H.S., Roth, P.: Ember: an open dataset for training static PE malware machine learning models. arXiv preprint arXiv:1804.04637 (2018)
5. Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: effective and explainable detection of Android malware in your pocket. In: NDSS, vol. 14, pp. 23–26 (2014)