Login / Signup

Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System.

Jian JiangFen Zhang
Published in: Secur. Commun. Networks (2021)
Keyphrases
  • evolutionary fuzzy
  • binary codes
  • hamming distance
  • evolutionary computing
  • artificial immune system
  • fuzzy logic
  • fuzzy controller
  • evolutionary algorithm
  • similarity search
  • real time
  • data sets