2016
DOI: 10.1016/j.cose.2016.06.004
|View full text |Cite
|
Sign up to set email alerts
|

Minimal contrast frequent pattern mining for malware detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
19
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 11 publications
1
19
0
Order By: Relevance
“…In this pair, items are the items that compose product P k , and value is the profit value of the product P k . Table 1 shows the example datasets that have five items including a, b, c, d, e, f and the set of products P 1 , P 2 , … , P 10 .…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this pair, items are the items that compose product P k , and value is the profit value of the product P k . Table 1 shows the example datasets that have five items including a, b, c, d, e, f and the set of products P 1 , P 2 , … , P 10 .…”
Section: Related Workmentioning
confidence: 99%
“…There are many methods [4,5] for mining FPs in recent years. In addition, some issues related to FP mining has been proposed such as maximal frequent patterns [6], top-k cooccurrence items with sequential pattern [7], weightedbased patterns [8], periodic-frequent patterns [9], and their applications [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…Ding et al [17] proposed QOOA that is an API-based association mining method for malware detection. Hellal et al [18] presented a new graph mining method to detect variants of malware using static analysis. They proposed a novel algorithm, called minimal contrast frequent subgraph miner algorithm (MCFSM), for extracting minimal discriminative and widely employed malicious behavioral patterns which can identify an entire family of malicious programs.…”
Section: Static Analysis-based Methodsmentioning
confidence: 99%
“…Hellal and Romdhane statically extract function calls of system API from analysed programs and divide them into 32 main categories of behaviour, with additional 4 subcategories for 4 types of actions -open, read, write and close, so in total 128 behaviour categories are used [11]. They also observe sequence of function calls, which is statically extracted from a program as an API call graph.…”
Section: Related Workmentioning
confidence: 99%