Author:
Nadeem Azqa,Rimmer Vera,Joosen Wouter,Verwer Sicco
Publisher
Springer International Publishing
Reference145 articles.
1. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;Y Aafer,2013
2. Ahmadi, M., Ulyanov, D., Semenov, S., Trofimov, M., Giacinto, G.: Novel feature extraction, selection and fusion for effective malware family classification. In: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, pp. 183–194 (2016)
3. Al-Dujaili, A., Huang, A., Hemberg, E., O’Reilly, U.M.: Adversarial deep learning for robust detection of binary encoded malware. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 76–82. IEEE (2018)
4. Al-rimy, B.A.S., Maarof, M.A., Shaid, S.Z.M.: Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput. Secur. 74, 144–166 (2018)
5. Alazab, M., Venkatraman, S., Watters, P., Alazab, M., et al.: Zero-day malware detection based on supervised learning algorithms of API call signatures. In: 2011 Australasian Data Mining Conference (AusDM 11) (2010)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SoK: Explainable Machine Learning for Computer Security Applications;2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P);2023-07
2. Learning About the Adversary;Advances in Information Security;2023