A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Deep learning based Sequential model for malware analysis using Windows exe API Calls
2020
PeerJ Computer Science
Malware development has seen diversity in terms of architecture and features. This advancement in the competencies of malware poses a severe threat and opens new research dimensions in malware detection. This study is focused on metamorphic malware, which is the most advanced member of the malware family. It is quite impossible for anti-virus applications using traditional signature-based methods to detect metamorphic malware, which makes it difficult to classify this type of malware
doi:10.7717/peerj-cs.285
pmid:33816936
pmcid:PMC7924690
fatcat:euacesaw2zgutly7fhbxerbbo4