Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach Authors: Khoi Khac Nguyen, Dinh Thai Hoang, Dusit Niyato, Ping Wang, Diep Nguyen, Eryk Dutkiewicz | Published: 2017-12-16 ML-Based IDSProactive DefenseMachine Learning Algorithm 2017.12.16 2025.05.28 Literature Database
Improving Malware Detection Accuracy by Extracting Icon Information Authors: Pedro Silva, Sepehr Akhavan-Masouleh, Li Li | Published: 2017-12-10 Clustering methodsMachine Learning AlgorithmImage Feature Extraction 2017.12.10 2025.05.28 Literature Database
Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection Authors: Ruimin Sun, Xiaoyong Yuan, Pan He, Qile Zhu, Aokun Chen, Andre Gregio, Daniela Oliveira, Xiaolin Li | Published: 2017-12-04 | Updated: 2021-10-17 Backdoor DetectionMachine Learning AlgorithmDeep Learning Model 2017.12.04 2025.05.28 Literature Database
Generative Adversarial Positive-Unlabelled Learning Authors: Ming Hou, Brahim Chaib-draa, Chao Li, Qibin Zhao | Published: 2017-11-21 | Updated: 2018-04-04 Machine Learning AlgorithmMachine Learning ApplicationGenerative Model Characteristics 2017.11.21 2025.05.28 Literature Database
Dynamic Analysis of Executables to Detect and Characterize Malware Authors: Michael R. Smith, Joe B. Ingram, Christopher C. Lamb, Timothy J. Draelos, Justin E. Doak, James B. Aimone, Conrad D. James | Published: 2017-11-10 | Updated: 2018-09-28 System Call AnalysisModel evaluation methodsMachine Learning Algorithm 2017.11.10 2025.05.28 Literature Database