ICML2019.pdf
2021-08-04
下载
大小:1.57MB
特征选择算法,ICML 文章
节选段落一:
For instance, detection of malware in PDF
files relies on the analysis of the PDF logical structure,
which consists of a large set of different kinds of objects
and metadata, yielding a high-dimensional data representa-
tion (Smutz & Stavrou, 2012; Maiorca et al., 2012; 2013;
Šrndić & Laskov, 2013)节选段落二:
Experiments
In this section, we consider an application example in-
volving the detection of malware in PDF files, i.e., one
among the most recent and relevant threats in computer se-
curity (IBM).节选段落三:
For instance, an
embedded resource in a PDF may look like:
13 0 obj << /Kids [ 1 0 R 11 0 R ]
/Type /Page ... >> end obj
where keywords are highlighted in bold face.
For instance, detection of malware in PDF
files relies on the analysis of the PDF logical structure,
which consists of a large set of different kinds of objects
and metadata, yielding a high-dimensional data representa-
tion (Smutz & Stavrou, 2012; Maiorca et al., 2012; 2013;
Šrndić & Laskov, 2013)节选段落二:
Experiments
In this section, we consider an application example in-
volving the detection of malware in PDF files, i.e., one
among the most recent and relevant threats in computer se-
curity (IBM).节选段落三:
For instance, an
embedded resource in a PDF may look like:
13 0 obj << /Kids [ 1 0 R 11 0 R ]
/Type /Page ... >> end obj
where keywords are highlighted in bold face.