2019 Seventh International Symposium on Computing and Networking Workshops (CANDARW) 2019
DOI: 10.1109/candarw.2019.00069
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Useful Features for Malware Detection in the Ember Dataset

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 11 publications
1
5
0
Order By: Relevance
“…As with Malconv, adding strings in the binary file is an effective technique to perturb Ember. This lack of robustness is consistent with the study of Oyama et al [35] which explains that only a few features contribute to explain Ember's results.…”
Section: Reinforce Algorithmsupporting
confidence: 91%
“…As with Malconv, adding strings in the binary file is an effective technique to perturb Ember. This lack of robustness is consistent with the study of Oyama et al [35] which explains that only a few features contribute to explain Ember's results.…”
Section: Reinforce Algorithmsupporting
confidence: 91%
“…During this research for performance evaluation of the network following evaluation, metrics are considered. Researchers most commonly use these measures for assessing performance [53,54,55].…”
Section: Resultsmentioning
confidence: 99%
“…Results obtained in the previous model release reported a 93% detection rate [24], meaning that the EMBER dataset developers have successfully hardened the process of correctly classifying malicious samples. Despite more recent works on the same dataset provide small improvements in the detection rate [25,26], they usually rely on deep learning frameworks that make more difficult to interpret model outputs.…”
Section: Related Workmentioning
confidence: 99%