2011
DOI: 10.1016/j.inffus.2011.02.001
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning for computer security: A guide to prospective authors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…However, all approaches to malware grouping run into different versions of the same set of problems. Malware is written by an active adversary who attempts to evade and mislead analysts, including complex code obfuscations and misdirection via code theft to slow analysts and thwart automation [27,28,29,30]. Even standard countermeasures such as packing, which hides the original source code of a program from static analysis, are poorly understood and difficult to circumvent [31].…”
Section: Malware Dataset Labeling Strategiesmentioning
confidence: 99%
“…However, all approaches to malware grouping run into different versions of the same set of problems. Malware is written by an active adversary who attempts to evade and mislead analysts, including complex code obfuscations and misdirection via code theft to slow analysts and thwart automation [27,28,29,30]. Even standard countermeasures such as packing, which hides the original source code of a program from static analysis, are poorly understood and difficult to circumvent [31].…”
Section: Malware Dataset Labeling Strategiesmentioning
confidence: 99%