TAA Abdullah, W Ali… - International Journal of …, 2020 - pdfs.semanticscholar.org
… malware, and permission features utilized as effective … straightforward machine learning techniques that depend on the … of malwaredetection approaches using dataminingtechniques.…
… behaviours of malware, resemblance-oriented mining and Machine Learning algorithms are used [14]. It is dependent on … Datamining methods are utilized for extracting the features of …
… In this approach, features obtained from static and dynamic … In Equation 1, y is called the dependent variable, and X is … include neural networks, machine learning and datamining. …
… However, there may be other kinds of attacks (eg obfuscated gradient based attacks [8] or attacks that do not depend on API function calls that we have not tested against). While we do …
… calls features) and further utilized in the malwaredetection … The velocity and position of a particle depend on the … He is currently an Associate Professor of big datamining and …
S Wang, Z Chen, Q Yan, K Ji, L Peng, B Yang… - Information Sciences, 2020 - Elsevier
… Therefore, we design a malwaredetectionmethod that is based on malicious URLs. Our method … on network traffic and machine learning algorithms are excessively feature-dependent. …
SK Sasidharan, C Thomas - Pervasive and Mobile Computing, 2021 - Elsevier
… is another approach where machine learning, datamining and … This work analyses the malicious features at four levels: … on the presence as well as position of API methods in the FASTA …
… the malwaredetection in an angle of extracting features that … Datamining and machine learning techniques are employed … depend on the smaller image set tS or an unknown malware …
… static position … call-basedmalwaredetection issue has also been prevented as a result of the adoption of function selection and clustering method to unify function call graph features of …