Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
Hisham AlasmaryAminollah KhormaliAfsah AnwarJeman ParkJinchun ChoiDaeHun NyangAziz MohaisenPublished in: CoRR (2019)
Keyphrases
- detect malicious
- graph theory
- graph representation
- random walk
- directed graph
- data mining
- malware detection
- graph theoretic
- bipartite graph
- structured data
- graph structure
- detecting malicious
- directed acyclic graph
- stable set
- data sets
- connected components
- graph based algorithm
- dependency graph
- information systems
- graph search
- graph data
- bayesian networks
- data structure
- graph databases
- graph model
- graph mining
- reverse engineering
- weighted graph