Detection of Malicious Executable Files Based on Clustering of Activities.
R. A. OgnevE. V. ZhukovskiiDmitry P. ZegzhdaPublished in: Autom. Control. Comput. Sci. (2021)
Keyphrases
- clustering algorithm
- anomaly detection
- clustering method
- detection algorithm
- false alarms
- object detection
- automatic detection
- graph theoretic
- detection method
- databases
- detection rate
- data clustering
- spectral clustering
- false positives
- k means
- fuzzy clustering
- detection accuracy
- neural network
- document clustering
- cluster analysis
- outlier detection
- event detection
- activity recognition
- hierarchical clustering
- intrusion detection
- e learning
- categorical data
- computer vision
- formal specification
- search engine