-
2
-
-
0034838197
-
Data mining methods of detection of new malicious executables
-
Matthew G. Schultz, Eleazar Eskin, Erez Zadok, and Salvatore J. Stolfo, "Data mining methods of detection of new malicious executables," in Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001, pp. 38-49.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
3
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
J.Zico Kolter and Marcus A. Maloof, "Learning to detect and classify malicious executables in the wild," in Journal of Machine Learning Research, 2006, pp. 2721-2744.
-
(2006)
Journal of Machine Learning Research
, pp. 2721-2744
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
4
-
-
33749573641
-
Very sparse random projections
-
Ping Li, Trevor J. Hastie, and Kenneth W. Church, "Very sparse random projections," in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2006), 2006, pp. 287-296.
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2006)
, pp. 287-296
-
-
Li, P.1
Hastie, T.J.2
Church, K.W.3
-
5
-
-
33746094275
-
Marginconstrained random projections and very sparse random projections
-
Ping Li, Trevor J. Hastie, and Kenneth W. Church, "Marginconstrained random projections and very sparse random projections," in Proceedings of the Conference on Learning Theory (COLT), 2006, pp. 635-649.
-
(2006)
Proceedings of the Conference on Learning Theory (COLT)
, pp. 635-649
-
-
Li, P.1
Hastie, T.J.2
Church, K.W.3
-
7
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
A. Moser, C. Kruegel, and E. Kirda, "Exploring multiple execution paths for malware analysis," in Proceedings of the IEEE Symposium on Security and Privacy (SP'07), 2007, pp. 231-245.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy (SP'07)
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
9
-
-
0037700468
-
Biologically inspired defenses against computer viruses
-
Jeffrey O. Kephart, Gregory B. Sorkin, William C. Arnold, David M. Chess, Gerald J. Tesauro, and Steve R. White, "Biologically inspired defenses against computer viruses," in Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995, pp. 985-996.
-
(1995)
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence
, pp. 985-996
-
-
Kephart, J.O.1
Sorkin, G.B.2
Arnold, W.C.3
Chess, D.M.4
Tesauro, G.J.5
White, S.R.6
-
10
-
-
0030216542
-
Neural networks for computer virus recognition
-
Gerald Tesauro, Jeffrey O. Kephart, and Gregory B. Sorkin, "Neural networks for computer virus recognition," in IEEE Expert, 1996, vol. 11, pp. 5-6.
-
(1996)
IEEE Expert
, vol.11
, pp. 5-6
-
-
Tesauro, G.1
Kephart, J.O.2
Sorkin, G.B.3
-
12
-
-
72749108629
-
Imad: In-execution malware analysis and detection
-
Syed Mehdi, Ajay Kumar Tanwani, and Muddassar Farooq, "Imad: in-execution malware analysis and detection," in Proceedings of the 11th Annual conference on Genetic and evolutionary computation, 2009, pp. 1553-1560.
-
(2009)
Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation
, pp. 1553-1560
-
-
Mehdi, S.1
Kumar Tanwani, A.2
Farooq, M.3
-
13
-
-
58549090885
-
Improving malware detection by applying multi-inducer ensemble
-
Eitan Menahem, Asaf Shabtai, Lior Rokach, and Yuval Elovici, "Improving malware detection by applying multi-inducer ensemble," in Proc. Computational Statistics & Data Analysis (CS&DA), 2009, vol. 53, pp. 1483-1494.
-
(2009)
Proc. Computational Statistics & Data Analysis (CS&DA)
, vol.53
, pp. 1483-1494
-
-
Menahem, E.1
Shabtai, A.2
Rokach, L.3
Elovici, Y.4
-
14
-
-
0022471098
-
-
London
-
David E. Rumelhart, Geoffrey E. Hinton, and Ronald J. Williams, "Learning representations by back-propagating errors," 1986, vol. 323, pp. 533-536, London.
-
(1986)
Learning Representations by Back-propagating Errors
, vol.323
, pp. 533-536
-
-
Rumelhart, D.E.1
Hinton, G.E.2
Williams, R.J.3
-
15
-
-
33745805403
-
-
MIT Press
-
Geoffrey E. Hinton, Simon Osindero, and Y. W. Teh, "A fast learning algorithm for deep belief nets," 2006, vol. 18, pp. 1527-1554, MIT Press.
-
(2006)
A Fast Learning Algorithm for Deep Belief Nets
, vol.18
, pp. 1527-1554
-
-
Hinton, G.E.1
Osindero, S.2
Teh, Y.W.3
-
16
-
-
84055222005
-
-
IEEE
-
George E. Dahl, Dong Yu, Li Deng, and Alex Acero, "Context-dependent pre-trained deep neural networks for large-vocabulary speech recognition," 2012, vol. 20, pp. 30-42, IEEE.
-
(2012)
Context-dependent Pre-trained Deep Neural Networks for Large-vocabulary Speech Recognition
, vol.20
, pp. 30-42
-
-
Dahl, G.E.1
Yu, D.2
Deng, L.3
Acero, A.4
-
17
-
-
84865801985
-
Conversational speech transcription using context-dependent deep neural networks
-
Frank Seide, Gang Li, and Dong Yu, "Conversational speech transcription using context-dependent deep neural networks," in Proceedings of Interspeech, 2011, pp. 437-440.
-
(2011)
Proceedings of Interspeech
, pp. 437-440
-
-
Seide, F.1
Li, G.2
Yu, D.3
|