This research is part of a continuing effort to show the viability of using random projection as a feature extraction and reduction technique in the classification of malware to produce more accurate classifiers. In this paper, we use a vector space model with n-gram analysis to produce weighted fea
โฆ LIBER โฆ
[ACM Press the 50th Annual Southeast Regional Conference - Tuscaloosa, Alabama (2012.03.29-2012.03.31)] Proceedings of the 50th Annual Southeast Regional Conference on - ACM-SE '12 - Applying random projection to the classification of malicious applications using data mining algorithms
โ Scribed by Durand, Jan; Atkison, Travis
- Book ID
- 121288497
- Publisher
- ACM Press
- Year
- 2012
- Weight
- 137 KB
- Category
- Article
- ISBN
- 1450312039
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
[ACM Press the 50th Annual Southeast Reg
โ
Durand, Jan; Atkison, Travis
๐
Article
๐
2012
๐
ACM Press
โ 137 KB
[ACM Press the 50th Annual Southeast Reg
โ
LeDoux, Charles; Sharkey, Michael; Primeaux, Brandon; Miles, Craig
๐
Article
๐
2012
๐
ACM Press
โ 255 KB
[ACM Press the 50th Annual Southeast Reg
โ
LeDoux, Charles; Sharkey, Michael; Primeaux, Brandon; Miles, Craig
๐
Article
๐
2012
๐
ACM Press
โ 255 KB
Disassemblers generally assume that assembly language instructions do not overlap, therefore, an obvious obfuscation against such disassemblers is to overlap instructions. This is difficult to implement, however, as the number of instructions existing in a program which can be overlapped are typical
[ACM Press the 50th Annual Southeast Reg
โ
Yu, Huiming; Powell, Nakia; Stembridge, Dexter; Yuan, Xiaohong
๐
Article
๐
2012
๐
ACM Press
โ 250 KB
[ACM Press the 50th Annual Southeast Reg
โ
Cruz, Juan Carlos Flores; Atkison, Travis
๐
Article
๐
2012
๐
ACM Press
โ 221 KB
[ACM Press the 50th Annual Southeast Reg
โ
Boyd, Jason; Chen, Yixin
๐
Article
๐
2012
๐
ACM Press
โ 571 KB