2020
DOI: 10.1109/access.2020.3038453
|View full text |Cite
|
Sign up to set email alerts
|

A Real-Time and Adaptive-Learning Malware Detection Method Based on API-Pair Graph

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 36 publications
0
14
0
Order By: Relevance
“…The adaptive learning system is divided into a macro adaptive learning system and a micro adaptive learning system. The former is adaptive based on predetermined criteria, that is, after the required adaptation is determined, the adaptive learning system is mainly composed of five parts: the domain model (displaying the content that students need to learn), the learning model (presenting the content) and learning strategy, the evaluation model (evaluating students’ basic knowledge), the teaching model (encouraging students’ to learn something more), and the adaptation model (determining what students need to learn next) ( Yang S. et al, 2020 ). Figure 1 shows the structure of adaptive learning.…”
Section: Theoretical Analysismentioning
confidence: 99%
“…The adaptive learning system is divided into a macro adaptive learning system and a micro adaptive learning system. The former is adaptive based on predetermined criteria, that is, after the required adaptation is determined, the adaptive learning system is mainly composed of five parts: the domain model (displaying the content that students need to learn), the learning model (presenting the content) and learning strategy, the evaluation model (evaluating students’ basic knowledge), the teaching model (encouraging students’ to learn something more), and the adaptation model (determining what students need to learn next) ( Yang S. et al, 2020 ). Figure 1 shows the structure of adaptive learning.…”
Section: Theoretical Analysismentioning
confidence: 99%
“…The idea behind that the behavior of malware variant has similarities with the behavior of its origin. In addition, as the executable malware cannot hide its malicious behavior once it is in the attack mode, a malware variant can be detected using real-time malware detection such that proposed in [43,48,49].…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…Other researchers have relied on dynamic features for detecting malware [198], [202], [210], [215], [221]. For instance, the authors of [210], [215] have used dynamic features such as behavior features, API calls and opcode sequences for detecting malware. However, if malware is able to disguise its behaviors and contents, these approaches may fail to detect it.…”
Section: E Machine Learning-based Malware Detectionmentioning
confidence: 99%
“…However, in addition to the high detection time and complex hardware modifications required to detect malware, this approach is also incapable of detecting malware in real-time, making it unsuitable for modern cars. A large portion of existing machine learning-based malware detection techniques relied on hybrid features to detect malware [199], [200], [203], [205], [206], [208], [210], [211], [213], [215], [219]. For example, the authors of [199], [200], [203], [205], [206], [208], [210], [213], [215], [219] have used system calls, instructions, image features, API calls, data flow, network flow, API call sequences and permissions as features for detecting malware.…”
Section: E Machine Learning-based Malware Detectionmentioning
confidence: 99%
See 1 more Smart Citation