Devising Malware Characterstics using Transformers

23 May 2020 Simra Shahid Tanmay Singh Yash Sharma Kapil Sharma

With the increasing number of cybersecurity threats, it becomes more difficult for researchers to skim through the security reports for malware analysis. There is a need to be able to extract highly relevant sentences without having to read through the entire malware reports... (read more)

PDF Abstract
No code implementations yet. Submit your code now

Tasks


Datasets


  Add Datasets introduced or used in this paper

Results from the Paper


  Submit results from this paper to get state-of-the-art GitHub badges and help the community compare results to other papers.

Methods used in the Paper


METHOD TYPE
Residual Connection
Skip Connections
Label Smoothing
Regularization
Multi-Head Attention
Attention Modules
Adam
Stochastic Optimization
ReLU
Activation Functions
Dropout
Regularization
BPE
Subword Segmentation
Dense Connections
Feedforward Networks
Layer Normalization
Normalization
Softmax
Output Functions
Scaled Dot-Product Attention
Attention Mechanisms
Transformer
Transformers