2020
DOI: 10.1587/transcom.2019cpp0009
|View full text |Cite
|
Sign up to set email alerts
|

IoT Malware Analysis and New Pattern Discovery Through Sequence Analysis Using Meta-Feature Information

Abstract: The usage of this PDF file must comply with the IEICE Provisions on Copyright. The author(s) can distribute this PDF file for research and educational (nonprofit) purposes only.Distribution by anyone other than the author(s) is prohibited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…It's been found that with stacking, unigram provides more than 97% of accuracy which is highest detection rate against bigram and trigram. Wu et al [31] present a malware classification method based on malware binaries, command sequences, and meta-features. They extracted key patterns of interaction behavior using an ngram model.…”
Section: E Feature Extractionmentioning
confidence: 99%
“…It's been found that with stacking, unigram provides more than 97% of accuracy which is highest detection rate against bigram and trigram. Wu et al [31] present a malware classification method based on malware binaries, command sequences, and meta-features. They extracted key patterns of interaction behavior using an ngram model.…”
Section: E Feature Extractionmentioning
confidence: 99%