Author:
Menahem Eitan,Shabtai Asaf,Rokach Lior,Elovici Yuval
Subject
Applied Mathematics,Computational Theory and Mathematics,Computational Mathematics,Statistics and Probability
Reference35 articles.
1. Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R., 2004. N-gram based detection of new malicious code. In: Proc. of the Annual International Computer Software and Applications Conference, COMPSAC’04
2. Buntine, W., 1990. A theory of learning classification rules. Doctoral Dissertation. School of Computing Science, University of Technology, Sydney
3. Comparison of feature selection and classification algorithms in identifying malicious executables;Caia;Computational Statistics and Data Analysis,2007
4. Clark, P., Boswell, R., 1991. Rule induction with CN2: Some recent improvements. In: Proc. of the European Working Session on Learning, pp. 151–163
5. Statistical comparisons of classifiers over multiple data sets;Demsar;Journal of Machine Learning Research,2006
Cited by
97 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献