Author:
Shabtai Asaf,Moskovitch Robert,Elovici Yuval,Glezer Chanan
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference56 articles.
1. Abou-Assaleh T, Cercone N, Keselj V, Sweidan R. N-gram based detection of new malicious code. In: Proceedings of the 28th annual international computer software and applications conference; 2004.
2. Opcodes as predictor for malware;Bilar;International Journal of Electronic Security and Digital Forensic,2007
3. Neural networks for pattern recognition;Bishop,1995
4. Buntine W. A theory of learning classification rules. Doctoral dissertation, Sydney: School of Computing Science, University of Technology; 1990.
5. SMOTE: synthetic minority over-sampling technique;Chawla;Journal of Artificial Intelligence Research (JAIR),2002
Cited by
187 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献