Comparative analysis of combinations of dimension reduction and data mining techniques for malware detection
Many malware detectors utilize data mining techniques as primary tools for pattern recognition. As malware continue to be produced at an increasing rate, so does the need more efficient and effective detectors. However, detection speed and accuracy are us
Saved in:
Main Author: | JEFFREY, YIU |
---|---|
Format: | text |
Published: |
Archīum Ateneo
2011
|
Subjects: | |
Online Access: | https://archium.ateneo.edu/theses-dissertations/164 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Ateneo De Manila University |
Similar Items
-
Comparative Analysis of Combinations of Dimension Reduction and Data Mining Techniques for Malware Detection
by: Fernandez, Proceso L, Jr, et al.
Published: (2010) -
Chameleon: Diverse detection of web malware
by: Mancia, Riegel Sean D., et al.
Published: (2012) -
ICCDetector: ICC-based malware detection on Android
by: KE, Xu, et al.
Published: (2016) -
On the Potential of Limitation-oriented Malware Detection and Prevention Techniques on Mobile Phones
by: YAN, Qiang, et al.
Published: (2010) -
Virus doctor in a box
by: Lo, Jefferson
Published: (2007)