Hadm: Hybrid analysis for detection of malware
Android is the most popular mobile operating system with a market share of over 80%[1].
Due to its popularity and also its open source nature, Android is now the platform most …
Due to its popularity and also its open source nature, Android is now the platform most …
A survey of graph comparison methods with applications to nondeterminism in high-performance computing
S Bhowmick, P Bell, M Taufer - The International Journal of …, 2023 - journals.sagepub.com
The convergence of extremely high levels of hardware concurrency and the effective overlap
of computation and communication in asynchronous executions has resulted in increasing …
of computation and communication in asynchronous executions has resulted in increasing …
Dynamic android malware classification using graph-based representations
Malware classification for the Android ecosystem can be performed using a range of
techniques. One major technique that has been gaining ground recently is dynamic analysis …
techniques. One major technique that has been gaining ground recently is dynamic analysis …
graphkit-learn: A Python library for graph kernels based on linear patterns
This paper presents graphkit-learn, the first Python library for efficient computation of graph
kernels based on linear patterns, able to address various types of graphs. Graph kernels …
kernels based on linear patterns, able to address various types of graphs. Graph kernels …
Graph kernels based on linear patterns: theoretical and experimental comparisons
Graph kernels are powerful tools to bridge the gap between machine learning and data
encoded as graphs. Most graph kernels are based on the decomposition of graphs into a set …
encoded as graphs. Most graph kernels are based on the decomposition of graphs into a set …
Parallelization of machine learning applied to call graphs of binaries for malware detection
Malicious applications have become increasingly numerous. This demands adaptive,
learning-based techniques for constructing malware detection engines, instead of the …
learning-based techniques for constructing malware detection engines, instead of the …
Evolutionary binary classification using cuckoo search for malware perception in api call sequences
Malware threats are continuing to grow in volume and sophistication. Current anti-virus
software is ineffective on the new generation malware threats. Ongoing developments in …
software is ineffective on the new generation malware threats. Ongoing developments in …
Bridging graph and kernel spaces: a pre-image perspective
L Jia - 2021 - theses.hal.science
Graphs are able to represent a wide range of real-world data due to the nature of their
structure and their rich expressiveness. With the advance of state-of-the-artmachine learning …
structure and their rich expressiveness. With the advance of state-of-the-artmachine learning …
Predicting the Impact of Android Malicious Samples Via Machine Learning
A Lopes, S Dave, Y Kane - Second International Conference on …, 2022 - Springer
The Android operating system, as well as smartphone apps for just about everything, is
widely available in the official Google Play store and several third-party markets …
widely available in the official Google Play store and several third-party markets …
Optimal parameter updating for optical diffusion imaging
Because optical diffusion imaging is a highly nonlinear inverse problem, iterative inversion
algorithms based on the Born approximation have usually been employed as reconstruction …
algorithms based on the Born approximation have usually been employed as reconstruction …