Using Markov chains to filter machine-morphed variants of malicious programs.
Mohamed R. ChouchaneAndrew WalensteinArun LakhotiaPublished in: MALWARE (2008)
Keyphrases
- markov chain
- steady state
- monte carlo
- transition probabilities
- markov process
- monte carlo method
- finite state
- random walk
- markov processes
- stationary distribution
- stochastic process
- state space
- monte carlo simulation
- markov model
- sample path
- transition matrix
- probabilistic automata
- assemble to order systems
- learning algorithm
- confidence intervals
- optimal policy
- optimal solution