Research Article
A Malware Detection Scheme via Smart Memory Forensics for Windows Devices
Table 3
Comparison of proposed DCNN model with other reference studies.
| Study | Dimension | Accuracy (%) | Precision (%) | Recall (%) | F1-score (%) |
| Nataraj et al. [16] (2011) | 32 × 32 | 91.4 | 91.5 | 91.4 | 91.5 | 1024 × 1024 |
| Dai et al. [10] (2018) | 2048 × 2048 | 94.5 | 94.6 | 94.5 | 94.5 | 4096 × 4096 |
| Rezende et al. [32] (2018) | 224 × 224 | 96.9 | 97.0 | 96.9 | 96.9 |
| Bozkir et al. [25] (2021) | 224 × 224 | 96.3 | 96.4 | 96.4 | 96.4 | 300 × 300 |
| Our method (optimal) | 224 × 224 | 98.1 | 98.0 | 98.0 | 98.0 | 300 × 300 |
|
|