References
- Huda, Shamsul, et al. “A hybrid-multi filter-wrapper framework to identify run-time behavior for fast malware detection.” Future Generation Computer Systems 83 (2018): 193-207. doi: 10.1016/j.future.2017.12.037
- Baldwin, James, and Ali Dehghantanha. “Leveraging support vector machine for opcode density-based detection of crypto-ransomware.” Cyber Threat Intelligence. Springer, Cham, 2018. 107-136.
- Bhatt, ArpitaJadhav, Chetna Gupta, and Sangeeta Mittal. “iABC-AL: Active learning-based privacy leaks threat detection for iOS applications.” Journal of King Saud University-Computer and Information Sciences (2018).
- Zhang, Hanqi, et al. “Classification of ransomware families with machine learning based on N-gram of opcodes.” Future Generation Computer Systems 90 (2019): 211-221. doi: 10.1016/j.future.2018.07.052
- Riasat, Rubata, et al. “Onamd: An Online Android Malware Detection Approach.” 2018 International Conference on Machine Learning and Cybernetics (ICMLC). Vol. 1. IEEE, 2018.
- Abro, F. I. (2018). Investigating Android permissions and intents for malware detection (Doctoral dissertation, City, University of London).
- Abro, FauziaIdrees. Investigating Android permissions and intents for malware detection. Diss. City, University of London, 2018.
- Cohen, Yehonatan, Danny Hendler, and Amir Rubin. “Detection of malicious webmail attachments based on propagation patterns.” Knowledge-Based Systems 141 (2018): 67-79. doi: 10.1016/j.knosys.2017.11.011
- Xiao, L., Ouyang, H., Fan, C. et al. Gesture image segmentation with Otsu’s method based on noise adaptive angle threshold. Multimed Tools Appl (2020)
- Arora, Anshul, et al. “Poster: Hybrid Android Malware Detection by Combining Supervised and Unsupervised Learning.” Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. ACM, 2018
- Case, Andrew, and Golden G. Richard III. “Detecting objective-C malware through memory forensics.” Digital Investigation 18 (2016): S3-S10. doi: 10.1016/j.diin.2016.04.017
- Pajouh, Hamed Haddad, et al. “Intelligent OS X malware threat detection with code inspection.” Journal of Computer Virology and Hacking Techniques 14.3 (2018): 213-223. doi: 10.1007/s11416-017-0307-5
- Case, Andrew, and Golden G. Richard III. “Advancing Mac OS X rootkit detection.” Digital Investigation 14 (2015): S25-S33. doi: 10.1016/j.diin.2015.05.005
- Pengfei, Jia, Zhang Chunkai, and He Zhenyu. “A new sampling approach for classification of imbalanced data sets with high density.” 2014 International Conference on Big Data and Smart Computing (BIGCOMP). IEEE, 2014.
- Chen, Dong. “Optimization algorithm of redundant data classification in distributed database.” Journal of Discrete Mathematical Sciences and Cryptography 21.2 (2018): 439-444. doi: 10.1080/09720529.2018.1449325
- Suman, Sujay Kumar, and Nishtha Hooda. “Predicting risk of Cervical Cancer: A case study of machine learning.” Journal of Statistics and Management Systems 22.4 (2019): 689-696. doi: 10.1080/09720510.2019.1611227
- Arora, Amandeep Singh, Barkha Bahl, and Linesh Raja. “Diverse real-time attack traffic forecasting for cloud platforms.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 541-555. doi: 10.1080/09720529.2019.1638579
- Džeroski, Saso, and Bernard Ženko. “Is combining classifiers with stacking better than selecting the best one?.” Machine learning 54.3 (2004): 255-273. doi: 10.1023/B:MACH.0000015881.36452.6e