2020
DOI: 10.1007/s11280-019-00755-0
|View full text |Cite
|
Sign up to set email alerts
|

A multiview learning method for malware threat hunting: windows, IoT and android as case studies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(15 citation statements)
references
References 43 publications
0
15
0
Order By: Relevance
“…In contrast, the theoretical processing speed of a subsequence-based music retrieval system is much faster than that of a speech recognitionbased system, making it possible to handle large amounts of Internet audio data. Existing research has achieved certain results for music retrieval, and if the retrieval system for music can achieve better results for speech retrieval at the same time, then it can make speech retrieval and audio retrieval be applied in the same system without the need for two systems and two algorithms [16]. In a real-time system, how to retrieve the information users want quickly is one of the most important problems facing retrieval.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast, the theoretical processing speed of a subsequence-based music retrieval system is much faster than that of a speech recognitionbased system, making it possible to handle large amounts of Internet audio data. Existing research has achieved certain results for music retrieval, and if the retrieval system for music can achieve better results for speech retrieval at the same time, then it can make speech retrieval and audio retrieval be applied in the same system without the need for two systems and two algorithms [16]. In a real-time system, how to retrieve the information users want quickly is one of the most important problems facing retrieval.…”
Section: Related Workmentioning
confidence: 99%
“…Wavelet transform is a new transform analysis method, which inherits and develops the idea of localization of shorttime Fourier transform, while overcoming the shortcomings such as window size does not change with frequency and can provide a time-frequency window that changes with frequency, which is an ideal tool for signal time-frequency analysis and processing [16]. In this algorithm, we use the Hal wavelet transform to process the subspeech spectrogram.…”
Section: Subsequence Music Retrieval Feature Processingmentioning
confidence: 99%
“…The majority of previous efforts, include having multiple ML threat hunting module [1] instead of a single comprehensive model. On the other hand, deep learning approaches have shown to have a significant impact on detecting malware [4,5,6,7,8,9] in different domains. The most complex challenge in any attack attribution task is building a verifiable and scientific method to relate different pieces of evidence and building a complete picture that depicts possible sources of an attack.…”
Section: Introductionmentioning
confidence: 99%
“…A machine learning method was used in their paper to automatically detect ransomware. Darabian et al [4] proposed a Multiview learning method to provide multiple views for malware threat hunting in the Internet of Things platforms. While these threat hunting methods could improve the accuracy of detection in a specific kind of threat actions, they did not address the diversity of threat activities.…”
Section: Related Workmentioning
confidence: 99%