Identifying Malicious Software Using Deep Residual Long-Short Term Memory.
Aziz AlotaibiPublished in: IEEE Access (2019)
Keyphrases
- software tools
- software systems
- software development
- recurrent neural networks
- software design
- computer systems
- test cases
- real time
- social networks
- software package
- source code
- software architecture
- software application
- hardware design
- design patterns
- operating system
- user interface
- decision making
- information systems
- search engine