VNU-UET Repository: No conditions. Results ordered -Date Deposited. 2024-03-28T16:36:21ZEPrintshttp://eprints.uet.vnu.edu.vn/images/sitelogo.pnghttps://eprints.uet.vnu.edu.vn/eprints/2018-12-12T06:36:08Z2018-12-12T06:36:08Zhttp://eprints.uet.vnu.edu.vn/eprints/id/eprint/3205This item is in the repository with the URL: http://eprints.uet.vnu.edu.vn/eprints/id/eprint/32052018-12-12T06:36:08ZComparison of Three Deep Learning-based Approaches for IoT Malware DetectionThe development of IoT brings many opportunities but also many challenges. Recently, increasing more malware has been appeared to target IoT devices. Machine learning is one of the typical techniques used in the detection of malware. In this paper, we survey three approaches for IoT malware detection based on the application of convolutional neural networks on different data representations including sequences, images, and assembly code. The comparison was conducted on the task of distinguishing malware from nonmalware. We also analyze the results to assess the pros/cons of each method.Tuan Trantranminhtuan@vnu.edu.vnNguyen KhanhSon LeAnh PhanOgawa Mizuhitomizuhito@jaist.ac.jpMinh Nguyennguyenml@jaist.ac.jp2018-06-08T08:55:03Z2018-06-10T08:06:21Zhttp://eprints.uet.vnu.edu.vn/eprints/id/eprint/2975This item is in the repository with the URL: http://eprints.uet.vnu.edu.vn/eprints/id/eprint/29752018-06-08T08:55:03ZEA: Wrapping Computer Algebra is Surprisingly Successful for Non-Linear SMTWe report on a prototypical tool for Satisfiability Modulo Theory solving for quantifier-free formulas in Non-linear Real Arithmetic or, more precisely,real closed fields, which uses a computer algebra system as the main component. This is complemented with two heuristic techniques, also stemming from computer algebra, viz. interval constraint propagation and subtropical satisfiability. Our key idea is to make optimal use of existing knowledge and work in the symbolic computation community, reusing available methods and implementations
to the most possible extent. Experimental results show that our approach is surprisingly efficient in practice.Fontain PascalOgawa MizuhitoSturm ThomasVan Khanh Tokhanhtv@vnu.edu.vnXuan Tung Vu