Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Table 1.

Summary of existing techniques.

More »

Table 1 Expand

Table 2.

Comparison of proposed model with existing techniques.

More »

Table 2 Expand

Fig 1.

Proposed model of Malware visualization and classification.

More »

Fig 1 Expand

Fig 2.

Dataset creating steps.

More »

Fig 2 Expand

Fig 3.

28 classes sample images of private dataset.

More »

Fig 3 Expand

More »

Expand

Fig 4.

Graphical representation of the staking-ensemble model.

More »

Fig 4 Expand

Table 3.

Private dataset description.

More »

Table 3 Expand

Table 4.

Cross-dataset generalization.

More »

Table 4 Expand

Table 5.

Ablation study model backbone and Fusion on private and Malimg dataset.

More »

Table 5 Expand

Table 6.

Class-wise performance on Private dataset.

More »

Table 6 Expand

Fig 5.

Family-wise confusion matrices for Adware, Trojan, Worm, and Win32 families.

More »

Fig 5 Expand

Fig 6.

ROC curve comparison across Malware Families.

More »

Fig 6 Expand

Fig 7.

Meta learning performance across Epochs.

More »

Fig 7 Expand

Table 7.

Class Class-wise accuracy of baseline models using Quadratic SVM classifier.

More »

Table 7 Expand

Table 8.

Zero-day attack detection on Malware Families.

More »

Table 8 Expand

Table 9.

Zero-day detection with leave-one-family-out protocol (averaged over 5 seeds).

More »

Table 9 Expand

Table 10.

Performance of Private dataset on deep model and classifiers.

More »

Table 10 Expand

Table 11.

Performance metric of AlexNet, ResNet-18 and ResNet-50 on each node using Custom dataset.

More »

Table 11 Expand

Fig 8.

Four different confusion matrix results on AlexNet and ResNet-18.

More »

Fig 8 Expand

Table 12.

Performance metric of AlexNet, ResNet-18 and ResNet-50 on each node using Malimg dataset.

More »

Table 12 Expand

Fig 9.

Node level comparison of different deep models.

More »

Fig 9 Expand

Table 13.

Comparison of Malimg dataset and Private dataset.

More »

Table 13 Expand