A state-of-the-art survey of malware detection approaches using data mining techniques

A Souri, R Hosseini - Human-centric Computing and Information Sciences, 2018 - Springer
… calls features, assembly features, and binary features are … Signature-based strategies depend
in light of exceptional crude … position in the established samples. The created information …

A survey on malware detection using data mining techniques

Y Ye, T Li, D Adjeroh, SS Iyengar - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
… intelligent malware detection approaches critically dependfeature extraction and the
classification/clustering techniques. … points or position vectors in a multidimensional feature space. …

Leveraging compression-based graph mining for behavior-based malware detection

T Wüchner, A Cisłak, M Ochoa… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
… a classical data mining rationale. As for most behavior-based malware detection approaches,
… mon sub-graphs on kernel object dependency graphs, to capture characteristic behavior of …

[PDF][PDF] An efficient mining based approach using PSO selection technique for analysis and detection of obfuscated malware

Z Ali, TR Soomro - Journal of Information Assurance & Cyber …, 2018 - researchgate.net
malware detection by selecting the best features using PSO … and graph based on data and
control dependency is constructed and … Their work used data mining techniques for searching …

Optimal feature configuration for dynamic malware detection

DE García, N DeCastro-Garcia - Computers & Security, 2021 - Elsevier
… degree of dependency between the different feature sets and … relevant, although their position
in the ranking may change. … of the process category is the most informative feature, even …

[PDF][PDF] A survey of malware detection techniques based on machine learning

H El Merabet, A Hajraoui - International Journal of …, 2019 - pdfs.semanticscholar.org
… kinds of input features used for malware detection will be … The final data mining model [1]
had a detection rate double … the existence of a feature regardless of its position. Barker et al. …

Improved malware detection model with apriori association rule and particle swarm optimization

OS Adebayo, N Abdul Aziz - Security and Communication …, 2019 - Wiley Online Library
… rules of apriori algorithm for feature extraction and signature … swarm optimization through
data mining technique with modified … The particle’s velocity and position in an updated standard …

[PDF][PDF] Empirical study on intelligent android malware detection based on supervised machine learning

TAA Abdullah, W Ali… - International Journal of …, 2020 - pdfs.semanticscholar.org
malware, and permission features utilized as effective … straightforward machine learning
techniques that depend on the … of malware detection approaches using data mining techniques.…

[HTML][HTML] MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics

W Han, J Xue, Y Wang, L Huang, Z Kong, L Mao - computers & security, 2019 - Elsevier
Based on the dependency graphs of malware samples, the common behavior graph was
extracted and used to represent the behavioral features of a malware … the beginning position as …

A comprehensive survey on deep learning based malware detection techniques

M Gopinath, SC Sethuraman - Computer Science Review, 2023 - Elsevier
… behaviours of malware, resemblance-oriented mining and Machine Learning algorithms are
used [14]. It is dependent on … Data mining methods are utilized for extracting the features of …