An Intelligent Analysis Method of Malicious Files Based on Generative Adversarial Networks
A malicious file and intelligent analysis technology, applied in the field of information security, can solve problems such as seldom considering timing characteristics such as synchronization and correlation, analysis technology is difficult to meet high detection rate, and label sample acquisition is difficult, so as to enhance detection ability and improve Improve detection accuracy and improve the effect of detection and classification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.
[0032] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field to which this application belongs. The terms used herein in the specification of the present application are for the purpose of describing specific embodiments only, and are not intended to limit the present application.
[0033]In one of the embodiments, a method for...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


