Run-time classification of malicious processes using system call analysis.
Raymond CanzaneseSpiros MancoridisMoshe KamPublished in: MALWARE (2015)
Keyphrases
- pattern recognition
- feature selection
- pattern analysis
- feature vectors
- machine learning
- image analysis
- decision rules
- benchmark datasets
- machine learning algorithms
- support vector machine svm
- classification accuracy
- training set
- decision trees
- pattern classification
- support vector machine
- classification method
- classification process
- class labels
- model selection
- feature extraction
- search engine