Search

Your search keyword '"Portable Executable"' showing total 96 results

Search Constraints

Start Over You searched for: Descriptor "Portable Executable" Remove constraint Descriptor: "Portable Executable" Search Limiters Full Text Remove constraint Search Limiters: Full Text
96 results on '"Portable Executable"'

Search Results

1. Malware Detection With Subspace Learning-Based One-Class Classification

2. Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure

3. Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure.

4. A Neural Network Approach to a Grayscale Image-Based Multi-File Type Malware Detection System.

5. A Neural Network Approach to a Grayscale Image-Based Multi-File Type Malware Detection System

6. Cost-effective ensemble models selection using deep reinforcement learning.

7. Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification

8. PROUD-MAL: static analysis-based progressive framework for deep unsupervised malware classification of windows portable executable

9. Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks

10. Code fusion information-hiding algorithm based on PE file function migration

11. Application of Distance Metric Learning to Automated Malware Detection

12. Malicious Code Detection: Run Trace Output Analysis by LSTM

13. Similarity hash based scoring of portable executable files for efficient malware detection in IoT

14. Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets

15. Stegomalware: A Systematic Survey of Malware Hiding and Detection in Images, Machine Learning Models and Research Challenges

16. A comprehensive study on learning-based PE malware family classification methods

17. Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis

18. Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification

19. An empirical study to estimate the stability of random forest classifier on the hybrid features recommended by filter based feature selection technique

20. Improving file-level fuzzy hashes for malware variant classification

21. A learning model to detect maliciousness of portable executable using integrated feature set

22. Survey of machine learning techniques for malware analysis

23. Windows PE Malware Detection Using Ensemble Learning

24. Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System

25. Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection

26. Detecting Malware based on Analyzing Abnormal behaviors of PE File

27. Effect of PE File Header Features on Accuracy

28. DeepMalNet: Evaluating shallow and deep networks for static PE malware detection

29. Performance Evaluation of Filter-based Feature Selection Techniques in Classifying Portable Executable Files

30. Securing the EDK II Image Loader

31. Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples

32. Malicious Powershell Detection Using Graph Convolution Network

33. Regression coefficients as triad scale for malware detection

34. Automatic Malicious Code Classification System through Static Analysis Using Machine Learning

35. Malware Detection with Neural Network Using Combined Features

36. Malware Detection Using a Heterogeneous Distance Function

37. Design and Development of a Command-line Tool for Portable Executable File Analysis and Malware Detection in IoT Devices

38. DLLMiner: structural mining for malware detection

39. A static heuristic approach to detecting malware targets

40. Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware

41. Machine Learning Aided Static Malware Analysis: A Survey and Tutorial

42. Learning the PE Header, Malware Detection with Minimal Domain Knowledge

43. Investigation of malicious portable executable file detection on the network using supervised learning techniques

44. On the adoption of anomaly detection for packed executable filtering

45. A Proposed System for Hiding Information In Portable Executable Files Based on Analyzing Import Section

46. Detecting Malicious Code by Binary File Checking

47. Virus Detection using Artificial Neural Networks

48. Metamorphic malware detection using base malware identification approach

49. Decentralised firewall for malware detection

50. Wavelet decomposition of software entropy reveals symptoms of malicious code

Catalog

Books, media, physical & digital resources