A Tiered Approach to Detect Metamorphic Malware With Hidden Markov Models
http://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=1356&context=etd_projects
6 2 1 Threshold Approach
3
8
6 2 2 Dueling Approach
39
6 2 3 Tiered Approach
40
6 2 3 1 Cluster Analysis 41
6 3
Results
4
3
6 3 1 Comparison: Time
43
6 3 2 Comparison: False Positive and False Negative
4
4
6 3 3 Consolidated Comparison
4
5
7 Conclusion and Future
Work
4
7
List of References
49
APPENDICES
A
Scatter Plots for Threshold Approach Results
5
4
B
Charts for the Dueling Approach
62
C
Charts for Tiered
Approach
6
7
D K
-
means clustering results 72
http://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=1356&context=etd_projects
6 2 1 Threshold Approach
3
8
6 2 2 Dueling Approach
39
6 2 3 Tiered Approach
40
6 2 3 1 Cluster Analysis 41
6 3
Results
4
3
6 3 1 Comparison: Time
43
6 3 2 Comparison: False Positive and False Negative
4
4
6 3 3 Consolidated Comparison
4
5
7 Conclusion and Future
Work
4
7
List of References
49
APPENDICES
A
Scatter Plots for Threshold Approach Results
5
4
B
Charts for the Dueling Approach
62
C
Charts for Tiered
Approach
6
7
D K
-
means clustering results 72
Comments
Post a Comment