This paper discusses computer worm detection using machine learning. More specifically, the generalization capability of autoencoders is investigated and improved using regularization and deep autoencoders. Models are constructed first without autoencoders and thereafter with autoencoders. The models with autoencoders are further improved using regularization and deep autoencoders. Results show an improved in the capability of models to generalize well to new examples.  
Abstract: We present a worm detection system that leverages the reliability of IP-Flow and the effec...
Domain generation algorithm (DGA) is used as the main source of script in different groups of malwar...
Due to their rapid spread, computer worms perform harmful tasks in networks, posing a security risk;...
The conference aimed at supporting and stimulating active productive research set to strengthen the ...
<p>Network intrusion detection systems typically detect worms by examining packet or flow logs...
The scope of this research is computer worm detection. Computer worm has been defined as a process t...
Worms are malicious programs that spread over the Internet without human intervention. Since worms g...
Worms are malicious programs that spread over the Internet without human intervention. Since worms g...
Network intrusion detection systems typically detect worms by examining packet or flow logs for know...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Active worms has been major security threat to the Internet. This is due to the ability of active wo...
Worms are malicious programs that spread over the Internet without human intervention. Since worms g...
Machine learning techniques are widely used in many fields. One of the applications of machine learn...
malware is malicious software (harmful program files) that targets and damage computers, devices, ne...
Abstract: We present a worm detection system that leverages the reliability of IP-Flow and the effec...
Domain generation algorithm (DGA) is used as the main source of script in different groups of malwar...
Due to their rapid spread, computer worms perform harmful tasks in networks, posing a security risk;...
The conference aimed at supporting and stimulating active productive research set to strengthen the ...
<p>Network intrusion detection systems typically detect worms by examining packet or flow logs...
The scope of this research is computer worm detection. Computer worm has been defined as a process t...
Worms are malicious programs that spread over the Internet without human intervention. Since worms g...
Worms are malicious programs that spread over the Internet without human intervention. Since worms g...
Network intrusion detection systems typically detect worms by examining packet or flow logs for know...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Active worms has been major security threat to the Internet. This is due to the ability of active wo...
Worms are malicious programs that spread over the Internet without human intervention. Since worms g...
Machine learning techniques are widely used in many fields. One of the applications of machine learn...
malware is malicious software (harmful program files) that targets and damage computers, devices, ne...
Abstract: We present a worm detection system that leverages the reliability of IP-Flow and the effec...
Domain generation algorithm (DGA) is used as the main source of script in different groups of malwar...
Due to their rapid spread, computer worms perform harmful tasks in networks, posing a security risk;...