Research Article
A Malware Detection Scheme via Smart Memory Forensics for Windows Devices
Table 3
Comparison of proposed DCNN model with other reference studies.
| | Study | Dimension | Accuracy (%) | Precision (%) | Recall (%) | F1-score (%) |
| | Nataraj et al. [16] (2011) | 32 × 32 | 91.4 | 91.5 | 91.4 | 91.5 | | 1024 × 1024 |
| | Dai et al. [10] (2018) | 2048 × 2048 | 94.5 | 94.6 | 94.5 | 94.5 | | 4096 × 4096 |
| | Rezende et al. [32] (2018) | 224 × 224 | 96.9 | 97.0 | 96.9 | 96.9 |
| | Bozkir et al. [25] (2021) | 224 × 224 | 96.3 | 96.4 | 96.4 | 96.4 | | 300 × 300 |
| | Our method (optimal) | 224 × 224 | 98.1 | 98.0 | 98.0 | 98.0 | | 300 × 300 |
|
|