Search

Your search keyword '"Portable Executable"' showing total 213 results

Search Constraints

Start Over You searched for: Descriptor "Portable Executable" Remove constraint Descriptor: "Portable Executable"
213 results on '"Portable Executable"'

Search Results

1. Windows operating system malware detection using machine learning.

2. Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier.

3. Malware Detection With Subspace Learning-Based One-Class Classification

4. Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure

5. Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure.

6. A Neural Network Approach to a Grayscale Image-Based Multi-File Type Malware Detection System.

8. Malware Detection Using Machine Learning Algorithms for Windows Platform

9. Review of Malware Detection Using Deep Learning

10. A Neural Network Approach to a Grayscale Image-Based Multi-File Type Malware Detection System

11. Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers

12. Cost-effective ensemble models selection using deep reinforcement learning.

13. EVASION OF ANTIVIRUS WITH THE HELP OF PACKERS.

14. Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification

15. A comprehensive analysis combining structural features for detection of new ransomware families.

16. Detection of Malicious Executables Using Static and Dynamic Features of Portable Executable (PE) File

17. Using NLP Specific Tools for Non-NLP Specific Tasks. A Web Security Application

18. FUNDAMENTALS OF STATIC MALWARE ANALYSIS: PRINCIPLES, METHODS AND TOOLS.

20. Measuring and Detecting Malware Downloads in Live Network Traffic

21. Malyzer: Defeating Anti-detection for Application-Level Malware Analysis

22. PROUD-MAL: static analysis-based progressive framework for deep unsupervised malware classification of windows portable executable

23. Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks

24. Windows Malware Detector Using Convolutional Neural Network Based on Visualization Images

25. A software classification scheme using binary-level characteristics for efficient software filtering.

26. Code fusion information-hiding algorithm based on PE file function migration

27. Application of Distance Metric Learning to Automated Malware Detection

28. Malicious Code Detection: Run Trace Output Analysis by LSTM

30. Similarity hash based scoring of portable executable files for efficient malware detection in IoT

31. Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets

32. A multi-view feature fusion approach for effective malware classification using Deep Learning.

33. Stegomalware: A Systematic Survey of Malware Hiding and Detection in Images, Machine Learning Models and Research Challenges

34. Combining Static and Dynamic Analysis to Improve Machine Learning-based Malware Classification

35. AI & ML Based Anamoly Detection and Response Using Ember Dataset

36. A comprehensive study on learning-based PE malware family classification methods

37. Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis

38. Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification

39. Malware visualization methods based on deep convolution neural networks

40. An empirical study to estimate the stability of random forest classifier on the hybrid features recommended by filter based feature selection technique

41. Improving file-level fuzzy hashes for malware variant classification

42. A learning model to detect maliciousness of portable executable using integrated feature set

43. Survey of machine learning techniques for malware analysis

44. Detecting Malware, Malicious URLs and Virus Using Machine Learning and Signature Matching

45. Improving Adversarial Attacks Against Executable Raw Byte Classifiers

46. FUMVar

47. Windows PE Malware Detection Using Ensemble Learning

48. Toward a Novel Decentralized Multi-malware Detection Engine Based on Blockchain Technology

49. Software Information Hiding Algorithm Based on Import Table of Portable Executable File

50. Ensemble-Based Stegomalware Detection System for Hidden Ransomware Attack

Catalog

Books, media, physical & digital resources