2017
DOI: 10.1007/s11042-017-4586-0
|View full text |Cite
|
Sign up to set email alerts
|

Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
4

Relationship

3
7

Authors

Journals

citations
Cited by 36 publications
(20 citation statements)
references
References 47 publications
0
20
0
Order By: Relevance
“…However, the number of features actually matters in building a good and reliable predictive model. Besides that, an extra number of features may contribute in overfitting and increase the complexity of the predictive model [ 52 ]. This study performed feature selection method by doing a features importance ranking using XGBoost.…”
Section: Methodsmentioning
confidence: 99%
“…However, the number of features actually matters in building a good and reliable predictive model. Besides that, an extra number of features may contribute in overfitting and increase the complexity of the predictive model [ 52 ]. This study performed feature selection method by doing a features importance ranking using XGBoost.…”
Section: Methodsmentioning
confidence: 99%
“…References of the articles with the use of the respective datasets Malgenome Anonymous (0000d) Yerima, Sezer & McWilliams (2014), Firdaus et al (2017), Firdaus & Anuar (2015), Firdaus et al (2018) Drebin Anonymous (0000c) Firdaus et al (2017); Firdaus et al (2018); Firdaus et al (2018) Android malware dataset (AMD) Badhani & Muttoo (2019) Contagio MilaParkour (2019) Feldman, Stadther & Wang (2014; Islamic & Minna (2015) Androzoo Université du Luxembourg ( 2018) Razak et al (2019); Firdaus et al (2017); Razak et al (2018); Firdaus et al (2017) Figure 4 Reverse engineer tools for static analysis. This is the example of reverse engineer tools that have been used by the previous researchers to extract the code for malware.…”
Section: Datasetmentioning
confidence: 99%
“…A number of works such as [9][10][11][12] have used bio-inspired concepts to provide cybersecurity solutions. They show the significance of such concepts as the basis for developing new self-resilient algorithm.…”
Section: Related Workmentioning
confidence: 99%