DOI: 10.1007/978-3-540-73547-2_48
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Codes Detection Based on Ensemble Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
31
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(32 citation statements)
references
References 10 publications
1
31
0
Order By: Relevance
“…The majority of our classifiers achieved better results than Henchiri & Japkowicz best ones, even though we used a simple feature selection method. Zhang et al (2007) leveraged a multi-classifier combination to build a malware detector. They evaluated the quality of their detector with the 5-Fold method on three datasets, each containing 150 malware and 423 goodware.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The majority of our classifiers achieved better results than Henchiri & Japkowicz best ones, even though we used a simple feature selection method. Zhang et al (2007) leveraged a multi-classifier combination to build a malware detector. They evaluated the quality of their detector with the 5-Fold method on three datasets, each containing 150 malware and 423 goodware.…”
Section: Related Workmentioning
confidence: 99%
“…Machine learning techniques, by allowing to sift through large sets of applications to detect malicious applications based on measures of similarity of features, appear to be promising for large-scale malware detection (Henchiri and Japkowicz 2006;Kolter and Maloof 2006;Zhang et al 2007;Sahs and Khan 2012;Perdisci et al 2008b). Unfortunately, measuring the quality of a malware detection scheme has always been a challenge, especially in the case of malware detectors whose authors claim that they work "in the wild".…”
mentioning
confidence: 99%
“…Researchers built ensemble malware detectors [1,10,11,14,17,18,20,22,24,25,29,30,35,36,38], based on combining general detectors. Moreover, most of them used off-line analysis [1,10,14,25,29,30,35,36].…”
Section: Related Workmentioning
confidence: 99%
“…A comprehensive survey of various techniques can be found in [5]. Approaches for large-scale detection are often based on Machine learning techniques, which allow to sift through large sets of applications to detect anomalies based on measures of similarity of features [6][7][8][9][10][11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%