Malicious Code Classification Method Based on Deep Forest

被引:0
|
作者
Lu, Xi-Dong [1 ]
Duan, Zhe-Min [1 ]
Qian, Ye-Kui [2 ]
Zhou, Wei [1 ]
机构
[1] School of Electronics and Information, Northwestern Polytechnical University, Xi'an,710072, China
[2] Zhengzhou Campus, PLA Army Artillery Air Defense Academy, Zhengzhou,450052, China
来源
Ruan Jian Xue Bao/Journal of Software | 2020年 / 31卷 / 05期
关键词
D O I
10.13328/j.cnki.jos.005660
中图分类号
学科分类号
摘要
引用
收藏
页码:1454 / 1464
相关论文
共 50 条
  • [41] A Lightweight Model for Malicious Code Classification Based on Structural Reparameterisation and Large Convolutional Kernels
    Li, Sicong
    Wang, Jian
    Song, Yafei
    Wang, Shuo
    Wang, Yanan
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2024, 17 (01)
  • [42] A Lightweight Model for Malicious Code Classification Based on Structural Reparameterisation and Large Convolutional Kernels
    Sicong Li
    Jian Wang
    Yafei Song
    Shuo Wang
    Yanan Wang
    [J]. International Journal of Computational Intelligence Systems, 17
  • [43] A Malicious Mining Code Detection Method Based on Multi-Features Fusion
    Li, Shudong
    Jiang, Laiyuan
    Zhang, Qianqing
    Wang, Zhen
    Tian, Zhihong
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 2731 - 2739
  • [44] A Malicious Code Detection Method Based on FF-MICNN in the Internet of Things
    Zhang, Wenbo
    Feng, Yongxin
    Han, Guangjie
    Zhu, Hongbo
    Tan, Xiaobo
    [J]. SENSORS, 2022, 22 (22)
  • [45] Research on Malicious Code Homology Analysis Method Based on Texture Fingerprint Clustering
    Zhao, Xiaolin
    Zhang, Yiman
    Li, Xuhui
    Chen, Quanbao
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1914 - 1921
  • [46] A GAN-EfficientNet-Based Traceability Method for Malicious Code Variant Families
    Li, Li
    Zhang, Qing
    Kong, Youran
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (01): : 801 - 818
  • [47] PBDG: a malicious code detection method based on precise behaviour dependency graph
    Tang, Chenghua
    Yang, Mengmeng
    Gao, Qingze
    Qiang, Baohua
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [48] Research on a malicious code behavior acquisition method based on the Bochs virtual machine
    Liu, H. Y.
    Cui, Y. J.
    [J]. CIVIL, ARCHITECTURE AND ENVIRONMENTAL ENGINEERING, VOLS 1 AND 2, 2017, : 1309 - 1312
  • [49] Improved Malicious Code Classification Considering Sequence by Machine Learning
    Paik, Incheon
    [J]. 18TH IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE 2014), 2014,
  • [50] A deep learning approach for detecting malicious Java']JavaScript code
    Wang, Yao
    Cai, Wan-dong
    Wei, Peng-cheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1520 - 1534