UofT Libraries is getting a new library services platform in January 2021.
Learn more about the change.
Search Articles
International Journal of Education and Management Engineering, ISSN 2305-3623, 03/2018, Volume 8, Issue 2, pp. 20 - 30
Journal Article
Jisuanji Xitong Yingyong = Computer Systems and Applications, ISSN 1003-3254, 01/2018, Issue 12
Journal Article
Computers & security, ISSN 0167-4048, 08/2018, Volume 77, pp. 756 - 772
Malware components | Banking malware | Malware similarity | Malware analysis | Malware capabilities | Computer Science, Information Systems | Technology | Computer Science | Science & Technology | Surveys | Usage | Applications programming | Banks (Finance) | Spyware | Computer viruses | Identification methods | Banking | Banking industry | Malware | Source code | Low level
Journal Article
Future generation computer systems, ISSN 0167-739X, 08/2019, Volume 97, pp. 887 - 909
Android malware | Malware | Mobile malware detection | Mobile malware | Forensics | Machine learning | Computer Science, Theory & Methods | Technology | Computer Science | Science & Technology | Business schools | Security management | Analysis | Forensic sciences | Artificial intelligence | Spyware
Journal Article
Concurrency and computation, ISSN 1532-0626, 03/2020, Volume 32, Issue 6, p. n/a
Journal Article
2015, ISBN 9781482252194, xx, 222 pages
Book
IEEE access, ISSN 2169-3536, 2020, Volume 8, pp. 206303 - 206324
Deep learning | Visualization | malware variants | Machine learning | Forestry | malware images | Feature extraction | malware detection | Malware | Data mining | malware classification | malware visualization | Computer Science, Information Systems | Engineering | Technology | Computer Science | Engineering, Electrical & Electronic | Telecommunications | Science & Technology | Classifiers | Robustness (mathematics) | Classification | Back propagation
Journal Article
IET information security, ISSN 1751-8709, 11/2015, Volume 9, Issue 6, pp. 313 - 320
Research Articles | static analysis | invasive software | ensemble machine learning | Android (operating system) | learning (artificial intelligence) | high accuracy Android malware detection | Computer Science, Information Systems | Computer Science, Theory & Methods | Technology | Computer Science | Science & Technology | Smartphones | Platforms | Accuracy | Applications programs | Machine learning | Malware | Computer information security | Gain
Journal Article
9.
Full Text
Malware classification using compact image features and multiclass support vector machines
IET information security, ISSN 1751-8709, 7/2020, Volume 14, Issue 4, pp. 419 - 429
Research Article | malware category | Internet tools | invasive software | support vector machines | malware binaries | image classification | multiclass support vector machines | BIG2015 malware datasets | malware developers | impair computer software | undetected vulnerabilities | information security specialists | security of data | feature extraction | image representation | optimised support vector machine model | Internet | highly discriminative features | learning (artificial intelligence) | compact image features | principal component analysis | malware categories | malware classification | Computer Science, Information Systems | Computer Science, Theory & Methods | Technology | Computer Science | Science & Technology
Journal Article
Computers & security, ISSN 0167-4048, 03/2019, Volume 81, pp. 123 - 147
Portable executable | Benchmark | Malware analysis economics | Malware analysis | Machine learning | Computer Science, Information Systems | Technology | Computer Science | Science & Technology | Economic analysis | Algorithms | Malware | Cost analysis | Decision trees | Artificial intelligence | Complexity | Computer Science - Cryptography and Security
Journal Article
Scalable Computing. Practice and Experience, ISSN 1895-1767, 2017, Volume 18, Issue 3, pp. 195 - 205
Journal Article
IET information security, ISSN 1751-8709, 1/2014, Volume 8, Issue 1, pp. 25 - 36
invasive software | operating system kernels | pattern classification | mobile malware | Android malware detection | signature based scanning | static analysis | smart phones | smartphones | learning (artificial intelligence) | machine learning | static analytic Bayesian classification | Computer Science, Information Systems | Computer Science, Theory & Methods | Technology | Computer Science | Science & Technology | Memory organisation. Data processing | Exact sciences and technology | Applied sciences | Software | Memory and file management (including protection and security) | Artificial intelligence | Computer science; control theory; systems | Bayesian analysis
Journal Article
EPJ Web of Conferences, ISSN 2101-6275, 06/2018, Volume 184, p. 2002
Conference Proceeding