Author:
Baychev Yanko,Bilge Leyla
Publisher
Springer International Publishing
Reference37 articles.
1. Ambroise, C., McLachlan, G.J.: Selection bias in gene extraction on the basis of microarray gene-expression data. Proc. Natl. Acad. Sci. 99(10), 6562–6566 (2002)
2. Anderson, B., Storlie, C., Lane, T.: Improving malware classification: bridging the static/dynamic gap. In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, pp. 3–14. ACM (2012)
3. Lecture Notes in Computer Science;M Bailey,2007
4. Barbosa, G.N., Branco, R.R.: Prevalent characteristics in modern malware. Black Hat USA (2014)
5. Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, behavior-based malware clustering. In: NDSS, vol. 9, pp. 8–11 (2009)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mitigating Malware Threats on Emerging Technology: A Machine Learning Approach;WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS;2024-05-15
2. A Comparative Study of Malware Detection Using Hybrid Deep Learning Techniques;2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS);2024-01-28
3. Detection of Malware by Deep Learning as CNN-LSTM Machine Learning Techniques in Real Time;Symmetry;2022-11-03
4. Spear Phishing Emails Detection Based on Machine Learning;2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD);2021-05-05
5. An Explainable Method of Phishing Emails Generation and Its Application in Machine Learning;2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC);2020-06