2019
DOI: 10.1016/j.procs.2019.09.173
|View full text |Cite
|
Sign up to set email alerts
|

A Model Based on LSTM Neural Networks to Identify Five Different Types of Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 9 publications
0
15
0
1
Order By: Relevance
“…For personal movement data, the external data to be collected should be the diversified data of gender, age, and body shape. To train the model, the dataset used in this experiment is based on the human movement data published by a large number of researchers on the Internet to form the final model, which is conducive to reflecting the accuracy of LSTM circular neural network model [24,25].…”
Section: Design Of Information Processing Systemmentioning
confidence: 99%
“…For personal movement data, the external data to be collected should be the diversified data of gender, age, and body shape. To train the model, the dataset used in this experiment is based on the human movement data published by a large number of researchers on the Internet to form the final model, which is conducive to reflecting the accuracy of LSTM circular neural network model [24,25].…”
Section: Design Of Information Processing Systemmentioning
confidence: 99%
“…Different malware detection approaches in the literature have adopted different machine-learning techniques, such as random forest (RF) [5][6][7], neural network [9][10][11], decision tree [12,13], naïve Bayes [14,15], KNN and SVM [15], ARIMA [16], and reinforcement learning [17,18].…”
Section: Related Workmentioning
confidence: 99%
“…Neural-network-based approaches in malware detection were introduced in [9-11], while a recurrent neural network (RNN)-based model was explored by Andrade et al [9].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For this case, the IoT devices are guarded against malware attacks by developing intelligent edge computing services [13]. Malware can attack any kind of software decisively to damage smart devices and information [14]. In worldwide, there are three methods commonly utilized for malware detection.…”
Section: Introductionmentioning
confidence: 99%