Research Article

Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System

Table 1

Immune methods in literature review.

IDMethodReferences

1Lymphocyte cloning and mutation[16–18]
2Skin defense[17, 19]
3Immunization[16, 20, 21]
4Cell defense[10, 22]
5Antibodies[22]