1 |
C.T. Lin, N.J. Wang, H. Xiao, and C. Eckert, “Feature Selection and Extraction for Malware Classification,” Journal of Information Science and Engineering, Vol. 31, No. 3, pp. 965-992, 2015.
|
2 |
G. Chandrashekar and F. Sahin, “A Survey on Feature Selection Methods,” Computers and Electrical Engineering, Vol. 40, No. 1, pp. 16-28, 2014.
DOI
|
3 |
youarespecial, https://github.com/endgameinc/youarespecial, (accessed Jan., 10, 2019).
|
4 |
C. Chio and D. Freeman, Machine Learning and Security, O'Reilly Media, Sebastpol, 2018.
|
5 |
T.H. Kim and S.H. Kang, “An Intrusion Detection System Based on the Artificial Neural Network for Real Time Detection,” Journal of Information and Security, Vol. 17, No. 1, pp. 31-38, 2017.
|
6 |
M.H. Nguyen, D.L. Nguyen, X.M. Nguyen, and T.T. Quan, "Auto-Detection of Sophisticated Malware Using Lazy-Binding Control Flow Graph and Deep Learning," Computers and Security Vol. 76, pp.128-155, 2018.
DOI
|
7 |
Wikipedia, https://en.wikipedia.org/wiki/Malware, (accessed Jan., 10, 2019).
|
8 |
C.S. Park, “An Email Vaccine Cloud System for Detecting Malcode-Bearing Documents,” Journal of Korea Multimedia Society, Vol. 13, No. 5, pp. 754-762, 2010.
|
9 |
Y. Elovici, A. Shabtai, R. Moskovitch, G. Tahan, and C. Glezer, "Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic," Proceeding of the IEEE Symposium on Annual Conference on Artificial Intelligence, pp. 44-50, 2007.
|
10 |
C.I. Rene and J. Abdullah, “Malicious Code Intrusion Detection Using Machine Learning And Indicators of Compromise,” International Journal of Computer Science and Information Security, Vol. 15, No. 9, pp. 160-171, 2017.
|
11 |
P. Singhal and N. Raul, “Malware Detection Module Using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks,” International Journal of Network Security and Its Applications, Vol. 4, No. 1, pp. 61-67, 2012.
DOI
|