Login / Signup

Malicious Code Detection: Run Trace Output Analysis by LSTM.

Cengiz AcartürkMelih SirlanciPinar Gurkan BalikciogluDeniz DemirciNazenin SahinOzge Acar Kucuk
Published in: IEEE Access (2021)
Keyphrases
  • data sets
  • data streams
  • data analysis
  • detection algorithm
  • noisy data
  • recurrent neural networks