Selection Method

Integrity Authentication in Tree Models

Authors: Weijie Zhao, Yingjie Lao, Ping Li | Published: 2022-05-30 | Updated: 2022-06-23
Identification of Signature Key
Selection Method
Hierarchical Classification Methods

Detection of Advanced Malware by Machine Learning Techniques

Authors: Sanjay Sharma, C. Rama Krishna, Sanjay K. Sahay | Published: 2019-03-07
Malware Evolution
Random Forest
Selection Method

Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks

Authors: Amir Moradibaad, Ramin Jalilian Mashhoud | Published: 2018-12-07 | Updated: 2018-12-13
Malware Detection
Research Methodology
Selection Method