Login / Signup
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack.
Jiaxuan Geng
Junfeng Wang
Zhiyang Fang
Yingjie Zhou
Di Wu
Wenhan Ge
Published in:
Comput. Secur. (2024)
Keyphrases
</>
empirical studies
statistical methods
information systems
preprocessing
data driven
benchmark datasets
machine learning methods
machine learning
feature extraction
video sequences
evolutionary algorithm
significant improvement
post processing
qualitative and quantitative
countermeasures