2019 11th International Conference on Knowledge and Systems Engineering (KSE) 2019
DOI: 10.1109/kse.2019.8919284
|View full text |Cite
|
Sign up to set email alerts
|

Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…These interactions can be captured using sandbox tools like cuckoo [84] for a deep analysis of the program's behaviors. Similarly as provenance graphs employed in host-based intrusion, these entities can be modeled as nodes in a graph, and the edges represent the operations between them [60,85].…”
Section: Common Graphmentioning
confidence: 99%
See 2 more Smart Citations
“…These interactions can be captured using sandbox tools like cuckoo [84] for a deep analysis of the program's behaviors. Similarly as provenance graphs employed in host-based intrusion, these entities can be modeled as nodes in a graph, and the edges represent the operations between them [60,85].…”
Section: Common Graphmentioning
confidence: 99%
“…The dynamic nature of communications between system entities provide valuable information to detect malicious behaviors. In the paper [60], authors monitor such interactions using dynamic analysis. Directed multi-edge graphs are built from interactions between four system entities: processes, files, registry keys and network sockets.…”
Section: Entity Graph Approaches For Windows Malwarementioning
confidence: 99%
See 1 more Smart Citation