Please use this identifier to cite or link to this item:
http://hdl.handle.net/123456789/23256
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shahrulniza Musa | - |
dc.date.accessioned | 2019-12-04T07:00:49Z | - |
dc.date.available | 2019-12-04T07:00:49Z | - |
dc.date.issued | 2019-12-04 | - |
dc.identifier.uri | http://ir.unikl.edu.my/jspui/handle/123456789/23256 | - |
dc.description.abstract | Abstract—The increasing growing number of malware attacks poses serious threats to the private data as well as to the expensive computer resources. To detect malware and their associated families, AntiVirus(AV) companies commonly rely on signatures, such as strings and regular expressions. However, the recent malware attacks in the last few years including the resurgence of ransomware proved that signature-based methods are error-prone and can be easily evaded by intelligent malware programs. This paper presents a survey of traditional and stateof-the-art models developed for malware analysis and detection. Further, the presented approaches for efficient classification of malware and their behavior facilitates in provision of basic insights for the researchers working in the domain of malware analysis through deep learning. | en_US |
dc.language.iso | en | en_US |
dc.subject | Neural Networks | en_US |
dc.subject | RNN | en_US |
dc.subject | CNN | en_US |
dc.subject | LSTM | en_US |
dc.subject | GAN | en_US |
dc.title | Malware Analysis and Detection Approaches: A Survey that Drives to Deep Learning in Analyzing Program Execution Flow | en_US |
dc.type | Other | en_US |
dc.conference.name | International Conference on Information and communication technology 2018 (ICICTM 2018) | en_US |
dc.conference.year | 2018 | en_US |
Appears in Collections: | Conference Paper |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Shahrulniza - Malware Analysis and Detection Approaches A Survey that Drives to Deep Learning in Analyzing Program Execution Flow.pdf | 58.75 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.