Cited By
View all- Saqib MMahdavifar SFung BCharland P(2024)A Comprehensive Analysis of Explainable AI for Malware HuntingACM Computing Surveys10.1145/367737456:12(1-40)Online publication date: 11-Jul-2024
- Liu LHe XLiu LQing LFang YLiu J(2019)Capturing the symptoms of malicious code in electronic documents by file’s entropy signal combined with machine learningApplied Soft Computing10.1016/j.asoc.2019.10559882:COnline publication date: 1-Sep-2019
- Perumal ZVeeramachaneni K(2018)Towards Building Active Defense Systems for Software ApplicationsCyber Security Cryptography and Machine Learning10.1007/978-3-319-94147-9_12(144-161)Online publication date: 21-Jun-2018
- Show More Cited By