Examples of normalized grayscale images for samples of three different types of malware graph embedding representations after transformation in Dataset 1.

<p>(a), (b), and (c) belong to the Normal type, while (d), (e), and (f) belong to the Ransom type, and (g), (h), and (i) belong to the Miner type.</p>

Saved in:
Bibliographic Details
Main Author: Cuihua Ma (14855149) (author)
Other Authors: Zhenwan Li (20890032) (author), Haixia Long (556765) (author), Anas Bilal (11785200) (author), Xiaowen Liu (190190) (author)
Published: 2025
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!