2020
DOI: 10.1049/cje.2020.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Malicious PDF Files Using a Two‐Stage Machine Learning Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 21 publications
0
12
0
Order By: Relevance
“…The author in [40] methodically puts forth several guiding concepts to select features to decrease the capacity for escape while retaining high accuracy. These guidelines are followed for extracting features and training a two-stage classifier.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The author in [40] methodically puts forth several guiding concepts to select features to decrease the capacity for escape while retaining high accuracy. These guidelines are followed for extracting features and training a two-stage classifier.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It can be problematic to directly discover features that possess robust causal relationships with class labels but removing features with low relationships is straightforward. In practical terms, causal feature selection requires a comprehensive analysis of the samples [5,13].…”
Section: Pdf Malware Classifiers and Evading Techniquesmentioning
confidence: 99%
“…Not only does it improve robustness, but it also makes it easy to reduce the feature dimensions. Similar to the study by He et al [5], the feature extraction method is applied to a benign dataset, and then abnormality is performed. The steps of the feature extraction based on encoding and n-gram are as follows:…”
Section: Feature Extraction From Object Content Based On Encoding And...mentioning
confidence: 99%
See 2 more Smart Citations