Comparative Analysis of LSTM, One-Class SVM, and PCA to Monitor Real-Time Malware Threats Using System Call Sequences and Virtual Machine Introspection
Crossref DOI link: https://doi.org/10.1007/978-981-33-4909-4_9
Published Online: 2021-03-26
Published Print: 2021
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Soni, Jayesh
Peddoju, Suresh K.
Prabakar, Nagarajan
Upadhyay, Himanshu
Text and Data Mining valid from 2021-01-01
Version of Record valid from 2021-01-01
Chapter History
First Online: 26 March 2021