๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

[ACM Press the 46th Annual Southeast Regional Conference - Auburn, Alabama (2008.03.28-2008.03.29)] Proceedings of the 46th Annual Southeast Regional Conference on XX - ACM-SE 46 - A survey of data mining techniques for malware detection using file features

โœ Scribed by Siddiqui, Muazzam; Wang, Morgan C.; Lee, Joohan


Book ID
120837709
Publisher
ACM Press
Year
2008
Tongue
English
Weight
640 KB
Category
Article
ISBN
1605581054

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


[ACM Press the 50th Annual Southeast Reg
โœ LeDoux, Charles; Sharkey, Michael; Primeaux, Brandon; Miles, Craig ๐Ÿ“‚ Article ๐Ÿ“… 2012 ๐Ÿ› ACM Press โš– 255 KB

Disassemblers generally assume that assembly language instructions do not overlap, therefore, an obvious obfuscation against such disassemblers is to overlap instructions. This is difficult to implement, however, as the number of instructions existing in a program which can be overlapped are typical

[ACM Press the 50th Annual Southeast Reg
โœ Durand, Jan; Atkison, Travis ๐Ÿ“‚ Article ๐Ÿ“… 2012 ๐Ÿ› ACM Press โš– 137 KB

This research is part of a continuing effort to show the viability of using random projection as a feature extraction and reduction technique in the classification of malware to produce more accurate classifiers. In this paper, we use a vector space model with n-gram analysis to produce weighted fea