Research Article
Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System
Algorithm 1
Polymorphic mutation algorithm.
| | Initialize | | For | | Pick index i uniformly at random from | | Draw a sample where is the set of all variables in except for the variable. | | Let | | Let denote the variable and let denote the set of all variables except . Let Let where | | | | | | |
|