Login / Signup
Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System.
Jian Jiang
Fen Zhang
Published in:
Secur. Commun. Networks (2021)
Keyphrases
</>
evolutionary fuzzy
binary codes
hamming distance
evolutionary computing
artificial immune system
fuzzy logic
fuzzy controller
evolutionary algorithm
similarity search
real time
data sets