2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM) 2021
DOI: 10.1109/etcm53643.2021.9590777
|View full text |Cite
|
Sign up to set email alerts
|

Relevant and Non-Redundant Feature Subset Selection Applied to the Detection of Malware in a Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Wrapper methods: Wrappers consider subsets of features by the quality of the performance of the subset on a modeling algorithm, which is taken as a black box evaluator. 43 It has been empirically proven that wrappers obtain subsets with better performance than filters because the subsets are evaluated using a real modeling algorithm. 38 3.…”
Section: Standard Feature Selectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Wrapper methods: Wrappers consider subsets of features by the quality of the performance of the subset on a modeling algorithm, which is taken as a black box evaluator. 43 It has been empirically proven that wrappers obtain subsets with better performance than filters because the subsets are evaluated using a real modeling algorithm. 38 3.…”
Section: Standard Feature Selectionmentioning
confidence: 99%
“…Importantly, many filter methods allow for parallelized score calculations, resulting in increased computational efficiency, as highlighted in Reference 41. This approach encompasses a wide range of algorithms, as described in Reference 42. Wrapper methods: Wrappers consider subsets of features by the quality of the performance of the subset on a modeling algorithm, which is taken as a black box evaluator 43 . It has been empirically proven that wrappers obtain subsets with better performance than filters because the subsets are evaluated using a real modeling algorithm 38 …”
Section: Introductionmentioning
confidence: 99%
“…We'll go over the most important stages below. The importance of preprocessing the dataset before model training is emphasized in the ML literature [24]. Tokenizing and lemmatizing the text is thus required before creating the model; they are crucial procedures to get the data ready for training and testing tasks [25].…”
Section: Model Trainingmentioning
confidence: 99%
“…In this context, the field of Artificial Intelligence (AI) can be used to automate that task. One of its subfields, Machine Learning (ML), enables the automated recognition of patterns in gathered data [5]. A deep learning approach based on Artificial Neural Networks (ANN) can be applied to train the model [6].…”
Section: Introductionmentioning
confidence: 99%