Login / Signup

Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory.

Aviad CohenNir Nissim
Published in: Expert Syst. Appl. (2018)
Keyphrases
  • false positives
  • feature extraction
  • feature vectors
  • low level
  • object detection
  • information sources
  • false alarms
  • database
  • co occurrence
  • feature set
  • detection method