I agree that this site is using cookies. You can find further informations
here
.
X
Login
Merkliste (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
zur Desktop-Version
Toggle navigation
Merkliste
1 Ergebnisse
1
Analysis And Identification of Malware Using Machine Learni..:
, In:
2024 International Conference on Intelligent Systems for Cybersecurity (ISCS)
,
Apon, Abir Hossain
;
Islam, Md Mojahidul
;
Vinoth Kumar, R
.. - p. 1-8 , 2024
Link:
https://doi.org/10.1109/ISCS61804.2024.10581170
RT T1
2024 International Conference on Intelligent Systems for Cybersecurity (ISCS)
: T1
Analysis And Identification of Malware Using Machine Learning with Optimized Features selections
UL https://suche.suub.uni-bremen.de/peid=ieee-10581170&Exemplar=1&LAN=DE A1 Apon, Abir Hossain A1 Islam, Md Mojahidul A1 Vinoth Kumar, R A1 Sarkar, Prantha Chandra A1 Roy, Avishek YR 2024 K1 Analytical models K1 Portable computers K1 Scalability K1 Feature extraction K1 Malware K1 Software measurement K1 Computer security K1 Adaboost K1 Classification K1 ExtraTree K1 Feature Optimization K1 Feature Selection K1 Feature Extraction K1 Kneighbor K1 Malware Detection K1 Machine Learning K1 Mal-ware Identification K1 Malware Analysis K1 Parameter K1 Ran-dom Forest K1 Recursive Feature Elimination K1 XGB SP 1 OP 8 LK http://dx.doi.org/https://doi.org/10.1109/ISCS61804.2024.10581170 DO https://doi.org/10.1109/ISCS61804.2024.10581170 SF ELIB - SuUB Bremen
Export
RefWorks (nur Desktop-Version!)
Flow
(Zuerst in
Flow
einloggen, dann importieren)