Keyphrases
Malicious Software
100%
Runtime Behavior
100%
Multifunction Filter
100%
Malicious Software Detection
100%
Filter-Wrapper
100%
Wrapper Feature Selection
25%
Detection Engine
25%
Wrapper
12%
Polymorphism
12%
Selection Strategy
12%
Metamorphism
12%
Behavioral Characteristics
12%
Detection Accuracy
12%
Performance Accuracy
12%
Storage System
12%
Critical Infrastructure
12%
Existing Techniques
12%
Feature Selection Methods
12%
Current Detection
12%
Intrinsic Attributes
12%
Obfuscation Techniques
12%
Wrapper Approach
12%
Code Obfuscation
12%
Hybrid Framework
12%
Software Features
12%
Computational Performance
12%
Time Characteristics
12%
Real-time Protection
12%
Cyber Threats
12%
Complementary Filter
12%
Software Development Toolkit
12%
Complementary Characteristics
12%
Runtime Analysis
12%
Software Datasets
12%
Number of Runs
12%
Cripple
12%
Computer Science
Malware
100%
Detection Engine
22%
Feature Selection
11%
Detection Accuracy
11%
Behavioral Characteristic
11%
Software Development
11%
Obfuscation Technique
11%
Real-Time Protection
11%
Storage System
11%
Complementary Filter
11%
Infected System
11%
Critical Infrastructure
11%
Selection Process
11%
Feature Extraction
11%