Detecting packer programs is a key step in the defense against malicious programs and plays a key role in cyber security defenses. One challenge with packer classification is that many features have been used and their individual significance is unknown. An effective approach for building classifiers without requiring prior knowledge of feature significance is to use associative classification (AC) algorithms, which combine association rules and classification. This work considers many different AC algorithms for the challenge of packer detection. Novel variations of many of these algorithms are also developed to address challenges related to having many features of varying types. The effectiveness of the classifiers produced by these algor...
A-Priori is an influence algorithm for finding frequent itemsets from association rules. But there a...
Associative classification, which is based on association rules, has shown great promise over many o...
Malware is software for harming a computer system. Current methods for detecting malware heavily use...
Packing is the most common obfuscation method used by malware writers to hinder malware detection an...
International audiencePackers are widespread tools used by malware authors to hinder static malware ...
Phishing websites are fake websites that are created by dishonest people to mimic webpages of real w...
Recently, a malware is growing rapidly and the number of malware applies various techniques to prote...
AbstractGenerating multi-label rules in associative classification (AC) from single label data sets ...
Associative Classification (AC) in data mining is a rule based approach that uses association rule t...
Packing is a widespread tool to prevent static malware detection and analysis. Detecting and classif...
Associative classification (AC) is a data mining approach that uses association rule discovery metho...
When attempting to build complex systems, systems that resemble the intelligence or efficiency found...
Packing is an obfuscation technique widely used by malware to hide the content and behavior of a pro...
Most of modern malware are packed by packers which automatically generate a lot of obfuscation techn...
International audiencePacking is a widespread tool to prevent static malware detection and analysis....
A-Priori is an influence algorithm for finding frequent itemsets from association rules. But there a...
Associative classification, which is based on association rules, has shown great promise over many o...
Malware is software for harming a computer system. Current methods for detecting malware heavily use...
Packing is the most common obfuscation method used by malware writers to hinder malware detection an...
International audiencePackers are widespread tools used by malware authors to hinder static malware ...
Phishing websites are fake websites that are created by dishonest people to mimic webpages of real w...
Recently, a malware is growing rapidly and the number of malware applies various techniques to prote...
AbstractGenerating multi-label rules in associative classification (AC) from single label data sets ...
Associative Classification (AC) in data mining is a rule based approach that uses association rule t...
Packing is a widespread tool to prevent static malware detection and analysis. Detecting and classif...
Associative classification (AC) is a data mining approach that uses association rule discovery metho...
When attempting to build complex systems, systems that resemble the intelligence or efficiency found...
Packing is an obfuscation technique widely used by malware to hide the content and behavior of a pro...
Most of modern malware are packed by packers which automatically generate a lot of obfuscation techn...
International audiencePacking is a widespread tool to prevent static malware detection and analysis....
A-Priori is an influence algorithm for finding frequent itemsets from association rules. But there a...
Associative classification, which is based on association rules, has shown great promise over many o...
Malware is software for harming a computer system. Current methods for detecting malware heavily use...