2013
DOI: 10.1007/s11416-013-0188-1
|View full text |Cite
|
Sign up to set email alerts
|

Building a practical and reliable classifier for malware detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Neural networks are algorithms used primarily to solve classification problems [18], [19]. Self Organizing Maps (SOM), also called Kohonen maps, are a special type of neural networks used in the field of Unsupervised Machine Learning.…”
Section: A Som For Minmax Multiple-tspmentioning
confidence: 99%
“…Neural networks are algorithms used primarily to solve classification problems [18], [19]. Self Organizing Maps (SOM), also called Kohonen maps, are a special type of neural networks used in the field of Unsupervised Machine Learning.…”
Section: A Som For Minmax Multiple-tspmentioning
confidence: 99%
“…Nissim et al 13 applied SVM on a carefully selected feature set and get the state-of-art detection performances. Another malware detection algorithm proposed by Vatamanu et al 22 makes use of simple perceptron learning algorithms and aggregate perceptrons to solve large scale malware detection problem. Accordingly, the most popular machine learning algorithms for malware detection include kernel methods like SVM and ensemble learning methods like boosting and voted perceptrons.…”
Section: Machine Learning Algorithmsmentioning
confidence: 99%
“…Because of the insensitive data used previously, Hadoop was not had that much of importance [4]- [6]. What makes it imperfect, limited access solution to the cluster cloud and other systems with traditional methods, which designed to process structured data such as data warehouse and management systems of a relational database are unable to handle large-scale data of unstructured type using an effective way [7]. Thus, HDFS is used to deal with such data type of sensitive and personal information, but its problems still existed until that time, especially in its authentication where it is possible for any user to penetrate and spy another user or cluster services [8].…”
Section: Introductionmentioning
confidence: 99%