Research Article
Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System
Table 1
Immune methods in literature review.
| ID | Method | References |
| 1 | Lymphocyte cloning and mutation | [16ā18] | 2 | Skin defense | [17, 19] | 3 | Immunization | [16, 20, 21] | 4 | Cell defense | [10, 22] | 5 | Antibodies | [22] |
|
|