References
- Matthew G. Schultz, Eleazae Eskin, and Erez Zadok, "Data Mining Methods for Detection of New Malicious Executables," IEEE International Conference on Security and Privacy, 2001.
- Manning C.D., Raghavan, P., Schutze, H., "An Introduction to Information Retrieval," Cambridge University Press, 2009
- Razvan Pascanu, Jack W. Stokes, Hermineh Sanossian, Mandy Marinescu, and Anil Thomas, "Malware Classification with Recurrent Networks," IEEE International Conference on Acoustics, Speech and Signal Processing, 2015
- Wenyi Huang and Jack W. Stokes, "MtNet: A Multi-Task Neural Network for Dynamic Malware Classification," International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2016
- Daesung Moon, Sung Bum Pan, and Ikkyun Kim, "Host-based intrusion detection system for secure human-centric computing," Journal of Supercomputing, 2016
- Daniel Gibert, "Convolutional Neural Networks for Malware Classification," Master Thesis, Universitat de Barcelona, 2016
- George E. Dahl, Jack W. Stokes, Li Deng, and Dong Yu, "Large-Scale Malware Classification using Random Projections and Neural Networks," IEEE International Conference on Acoustics, Speech and Signal Processing, 2013
- Li, P., Hastie, T.J., Church, K.W., "Very sparse random projections," ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ICDM), 2006
- Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R., "Dropout: A simple way to prevent neural networks from overfitting." J. Mach. Learn. Res., 2014
- Ulrich Bayer, Christopher Kruegel, and Engin Kirda, "TTAnalyze: A tool for analyzing malware," Annual Conference of the European Institute for Computer Antivirus Research (EICAR), 2006
- A. Moser, C. Kruegel, and E. Kirda, "Exploring multiple execution paths for malware analysis," IEEE Symposium on Security and Privacy, 2007
- Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean, "Distributed representations of words and phrases and their compositionality," Advamces om Neural Information Processing Systems, 2013
- https://www.kaggle.com/c/malware-classification
- Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton, "Imagenet classification with deep convolutional neural networks," Advances in Neural Information Processing Systems, 2012
- L. Nataraj, S. Karthikeyan, G. Jacob, B. S. Manjunath, "Malware Images: Visualization and Automatic Classification," ACM VizSec, 2011
- Aude Oliva and Antonio Torralba, "Modeling the shape of the scene: A holistic representation of the spatial envelope," International Journal of Computer Vision, 2001
- WannerCry randomware attack, https://en.wikipe dia.org/wiki/WannaCry_ransomware_attack
- W. Xu, Y. Qi, D. Evans, "Automatically Evading Classifiers," Network and Distributed Systems Symposium, 2016