Malware API Call Dataset
收藏Mendeley Data2024-01-31 更新2024-06-27 收录
下载链接:
https://ieee-dataport.org/open-access/malware-api-call-dataset
下载链接
链接失效反馈官方服务:
资源简介:
Our public malware dataset generated by Cuckoo Sandbox based on Windows OS API calls analysis for cyber security researchers.Cite The DataSet If you find those results useful please cite them : @article{10.7717/peerj-cs.285, title = {Deep learning based Sequential model for malware analysis using Windows exe API Calls}, author = {Catak, Ferhat Ozgur and Yazı, Ahmet Faruk and Elezaj, Ogerta and Ahmed, Javed}, year = 2020, month = jul, keywords = {Malware analysis, Sequential models, Network security, Long-short-term memory, Malware dataset}, volume = 6, pages = {e285}, journal = {PeerJ Computer Science}, issn = {2376-5992},
本公开恶意软件数据集由布谷鸟沙箱(Cuckoo Sandbox)基于Windows操作系统应用程序编程接口(API)调用分析生成,面向网络安全研究人员。若您认为本数据集的分析结果具备实用价值,请引用如下文献:@article{10.7717/peerj-cs.285}, 标题为《基于Windows可执行文件API调用的恶意软件分析深度学习序列模型》,作者为Catak, Ferhat Ozgur、Yazı, Ahmet Faruk、Elezaj, Ogerta、Ahmed, Javed,发表于2020年7月,关键词包括恶意软件分析、序列模型、网络安全、长短期记忆网络、恶意软件数据集,卷数为6,页码为e285,期刊为《PeerJ计算机科学》,ISSN为2376-5992。
创建时间:
2024-01-31



