An Efficient Man-Machine Recognition Method Based On Mouse Trajectory Feature De-redundancy
Abstract
References
Index Terms
- An Efficient Man-Machine Recognition Method Based On Mouse Trajectory Feature De-redundancy
Recommendations
Clustering botnet communication traffic based on n-gram feature selection
Recognized as one the most serious security threats on current Internet infrastructure, botnets can not only be implemented by existing well known applications, e.g. IRC, HTTP, or Peer-to-Peer, but also can be constructed by unknown or creative ...
A Malware Detection Framework Based on Forensic and Unsupervised Machine Learning Methodologies
ICSCA '20: Proceedings of the 2020 9th International Conference on Software and Computer ApplicationsThe detection of malware intrusion requires the identification of its signature. However, it is a complex task due to the malware sophisticated ability to evade security mechanisms deployed by cybersecurity practitioners. Evasion is possible due to ...
Machine-Learning based analysis and classification of Android malware signatures
AbstractMulti-scanner Antivirus (AV) systems are often used for detecting Android malware since the same piece of software can be checked against multiple different AV engines. However, in many cases the same software application is flagged as ...
Highlights- Analysis and Normalization of more than 250k Android related multi-scanner malware signatures using SignatureMiner.
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/0a0b1fc9-8113-4562-b6bb-4f871ee9fb45/3485832.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 155Total Downloads
- Downloads (Last 12 months)17
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format