Proceedings of the 50th Hawaii International Conference on System Sciences (2017) 2017
DOI: 10.24251/hicss.2017.734
|View full text |Cite
|
Sign up to set email alerts
|

Discovering Malware with Time Series Shapelets

Abstract: Malicious software ('malware')

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 27 publications
0
8
0
1
Order By: Relevance
“…DroidMat used k-means, naive bayes, k-nearest neighbour algorithms and accomplished the highest f-measure of 91.8% [27]. Patri et al performed entropy analysis and shapelet-based classification for PE files [15]. Wenjia Li et al in 2018 used kirin rules on Drebin to achieve a recall of 94.29% [11].…”
Section: Related Workmentioning
confidence: 99%
“…DroidMat used k-means, naive bayes, k-nearest neighbour algorithms and accomplished the highest f-measure of 91.8% [27]. Patri et al performed entropy analysis and shapelet-based classification for PE files [15]. Wenjia Li et al in 2018 used kirin rules on Drebin to achieve a recall of 94.29% [11].…”
Section: Related Workmentioning
confidence: 99%
“…Learning from imbalanced classes can naturally cause the algorithm to favor the more numerous class, but also be detrimental in failing to learn how to properly separate the classes. Class imbalance is a common problem in the malware domain (Patri et al, 2017;Cross and Munson, 2011;Li et al, 2017;Yan et al, 2013;Moskovitch et al, 2009a;Yan, 2015), which makes it especially important to consider the evaluation metric used for both malware detection and family classification (as mentioned in subsection 7.1 and subsection 7.2).…”
Section: Multiple Views Of Malwarementioning
confidence: 99%
“…Los sistemas de detección actuales utilizan varios algoritmos: clasificador Naive Bayes [12], Support Vector Machine [13], Random Forest [14], redes neuronales profundas [15], redes neuronales convolucionales [16], redes long-short term memory (LSTM) [17,18] y otros [19][20][21][22][23].…”
Section: Malwareunclassified