Author:
Rahman Md. Abdur,Shahrier Hossain
Publisher
Springer Nature Switzerland
Reference39 articles.
1. Studies in Computational Intelligence;K Grahn,2017
2. Chen, Q., Bridges, R.A.: Automated behavioral analysis of malware: a case study of WannaCry ransomware. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), Cancun, Mexico, pp. 454–460. IEEE (2017). https://doi.org/10.1109/ICMLA.2017.0-119
3. Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey. arXiv preprint arXiv:1901.03407, pp. 1–50 (2019)
4. Shahriar, H., Zulkernine, M.: Mitigating program security vulnerabilities: approaches and challenges. ACM Comput. Surv. (CSUR) 44(3), 1–46 (2012)
5. Shahriar, H., Weldemariam, K., Zulkernine, M., Lutellier, T.: Effective detection of vulnerable and malicious browser extensions. Comput. Secur. 47, 66–84 (2014)