A Survey on Feature Extraction Methods of Heuristic Malware Detection

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey on Malware Detection Methods

Malwares are malignant software’s .It is designed to damage computer systems without the knowledge of the owner using the system. Software’s from reputable vendors also contain malicious code that affects the system or leaks information’s to remote servers.Malware’s includes computer viruses, spyware, dihonest ad-ware,rootkits,Trojans,dialers etc. The paper focuses on various Malware detection ...

متن کامل

A Study of Various Feature Extraction Methods on a Motor Imagery Based Brain Computer Interface System

Introduction: Brain Computer Interface (BCI) systems based on Movement Imagination (MI) are widely used in recent decades. Separate feature extraction methods are employed in the MI data sets and classified in Virtual Reality (VR) environments for real-time applications. Methods: This study applied wide variety of features on the recorded data using Linear Discriminant Analysis (LDA) classifie...

متن کامل

Survey on Feature Extraction methods in Object Recognition

Feature extraction is the key process in any pattern recognition issues. There is no exception in object recognition. In this paper, several feature extraction approaches in the field of object recognition are summed up. Zernike and Hu are two invariant moments and geodesic descriptors are applied directly to binary images and so we can have more information about the general shape of the objec...

متن کامل

A Survey of Methods for 3D Model Feature Extraction

This paper deals with problems that are related to a feature extraction from 3D objects. The main aim of the feature extraction is to describe a shape of 3D object by a feature vector. Then the elements of this feature vector characterize the shape of the own 3D objects and they can serve as a key in searching for similar models. In this paper are introduced current methods for the feature extr...

متن کامل

Feature Extraction Methods for Intrusion Detection Systems

Intrusion Detection Systems (IDSs) have become an important security tool for managing risk and an indispensable part of overall security architecture. An IDS is considered as a pattern recognition system, in which feature extraction is an important pre-processing step. The feature extraction process consists of feature construction and feature selection. The quality of the feature construction...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Physics: Conference Series

سال: 2021

ISSN: 1742-6588,1742-6596

DOI: 10.1088/1742-6596/1757/1/012071