10
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Malware analysis using visualized images and entropy graphs

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references21

          • Record: found
          • Abstract: not found
          • Article: not found

          A new method for gray-level picture thresholding using the entropy of the histogram

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Malware images

              Bookmark
              • Record: found
              • Abstract: found
              • Article: not found

              Rapid biologically-inspired scene classification using features shared with visual attention.

              We describe and validate a simple context-based scene recognition algorithm for mobile robotics applications. The system can differentiate outdoor scenes from various sites on a college campus using a multiscale set of early-visual features, which capture the "gist" of the scene into a low-dimensional signature vector. Distinct from previous approaches, the algorithm presents the advantage of being biologically plausible and of having low-computational complexity, sharing its low-level features with a model for visual attention that may operate concurrently on a robot. We compare classification accuracy using scenes filmed at three outdoor sites on campus (13,965 to 34,711 frames per site). Dividing each site into nine segments, we obtain segment classification rates between 84.21 percent and 88.62 percent. Combining scenes from all sites (75,073 frames in total) yields 86.45 percent correct classification, demonstrating the generalization and scalability of the approach.
                Bookmark

                Author and article information

                Journal
                International Journal of Information Security
                Int. J. Inf. Secur.
                Springer Science and Business Media LLC
                1615-5262
                1615-5270
                February 2015
                April 29 2014
                February 2015
                : 14
                : 1
                : 1-14
                Article
                10.1007/s10207-014-0242-0
                e72e8acb-839c-4874-8ae5-a3ae95a238c3
                © 2015

                http://www.springer.com/tdm

                History

                Comments

                Comment on this article