Please use this identifier to cite or link to this item: http://hdl.handle.net/123456789/23256
Full metadata record
DC FieldValueLanguage
dc.contributor.authorShahrulniza Musa-
dc.date.accessioned2019-12-04T07:00:49Z-
dc.date.available2019-12-04T07:00:49Z-
dc.date.issued2019-12-04-
dc.identifier.urihttp://ir.unikl.edu.my/jspui/handle/123456789/23256-
dc.description.abstractAbstract—The increasing growing number of malware attacks poses serious threats to the private data as well as to the expensive computer resources. To detect malware and their associated families, AntiVirus(AV) companies commonly rely on signatures, such as strings and regular expressions. However, the recent malware attacks in the last few years including the resurgence of ransomware proved that signature-based methods are error-prone and can be easily evaded by intelligent malware programs. This paper presents a survey of traditional and stateof-the-art models developed for malware analysis and detection. Further, the presented approaches for efficient classification of malware and their behavior facilitates in provision of basic insights for the researchers working in the domain of malware analysis through deep learning.en_US
dc.language.isoenen_US
dc.subjectNeural Networksen_US
dc.subjectRNNen_US
dc.subjectCNNen_US
dc.subjectLSTMen_US
dc.subjectGANen_US
dc.titleMalware Analysis and Detection Approaches: A Survey that Drives to Deep Learning in Analyzing Program Execution Flowen_US
dc.typeOtheren_US
dc.conference.nameInternational Conference on Information and communication technology 2018 (ICICTM 2018)en_US
dc.conference.year2018en_US
Appears in Collections:Conference Paper



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.