2023
DOI: 10.1016/j.cose.2022.103060
|View full text |Cite
|
Sign up to set email alerts
|

IoT malware classification based on reinterpreted function-call graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…The first method converts the permission features into gray images, converting the malware detection task into an image classification task with CNN model 29 . The second method is based on API calls' frequency and importance, ignoring the APK's permissions 44 . The third method is based on the n‐gram of opcodes and uses the frequency of triplet features to represent 54 .…”
Section: Experimental Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The first method converts the permission features into gray images, converting the malware detection task into an image classification task with CNN model 29 . The second method is based on API calls' frequency and importance, ignoring the APK's permissions 44 . The third method is based on the n‐gram of opcodes and uses the frequency of triplet features to represent 54 .…”
Section: Experimental Analysismentioning
confidence: 99%
“…29 The second method is based on API calls' frequency and importance, ignoring the APK's permissions. 44 The third method is based on the n-gram of opcodes and uses the frequency of triplet features to represent. 54 The paper compares the detection results using different malware features and deep learning methods, as shown in Table 6 below.…”
Section: Experimental Evaluationmentioning
confidence: 99%