Abstract:The use of innovative and sophisticated malware definitions poses a serious threat to computer-based information systems. Such malware is adaptive to the existing security solutions and often works without detection. Once malware completes its malicious activity, it self-destructs and leaves no obvious signature for detection and forensic purposes. The detection of such sophisticated malware is very challenging and a non-trivial task because of the malware’s new patterns of exploiting vulnerabilities. Any secu… Show more
“…In [6], the authors presented an approach called eRBCM to detect malware. The eRBCM system was designed using the reinforcement learning approach, which utilizes the strength of Monte-Carlo simulations and builds a strong machine learning model to detect complex malware patterns.…”
“…In [6], the authors presented an approach called eRBCM to detect malware. The eRBCM system was designed using the reinforcement learning approach, which utilizes the strength of Monte-Carlo simulations and builds a strong machine learning model to detect complex malware patterns.…”
As smartphones and other mobile and IoT devices have become pervasive in everyday life, malicious software (malware) authors are increasingly targeting the operating systems that are at the core of these mobile systems [...]
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.