你正派 发表于 2025-3-28 14:39:30

E. Frey,K. Kroy,J. Wilhelm,E. Sackmann apps packaging structure, which contains not only the actual compiled code but also other content such as media files. To overcome this limitation, we propose an effective and broad fuzzy fingerprint that captures not only binary features but also the underneath structure and semantics of the . package.

Psa617 发表于 2025-3-28 20:36:18

http://reply.papertrans.cn/16/1571/157072/157072_42.png

tinnitus 发表于 2025-3-28 22:57:06

http://reply.papertrans.cn/16/1571/157072/157072_43.png

deface 发表于 2025-3-29 03:42:48

https://doi.org/10.1007/978-3-540-76376-5rtificial neural network that takes, as input, the raw sequences of API method calls, as they appear in the DEX file, to enable malware detection and family attribution. . can automatically recognize malicious patterns using only the sequences of raw method calls in the assembly code.

Parallel 发表于 2025-3-29 08:45:00

Portable Supervised Malware Fingerprinting Using Deep Learning,rtificial neural network that takes, as input, the raw sequences of API method calls, as they appear in the DEX file, to enable malware detection and family attribution. . can automatically recognize malicious patterns using only the sequences of raw method calls in the assembly code.

epicondylitis 发表于 2025-3-29 14:57:55

Complex Analysis. Kentucky 1976978-3-540-37303-2Series ISSN 0075-8434 Series E-ISSN 1617-9692
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Android Malware Detection using Machine Learning; Data-Driven Fingerpr ElMouatez Billah Karbab,Mourad Debbabi,Djedjiga Mo Book 2021 The Edi