Research Article
Toward Detecting Malware Based on Process-Aware Behaviors
Table 3
Test results comparison with state-of-the-art.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1Note that Arg. is abbreviated to argument and Pro. to process feature. As for pro-time and detect-time denotes processing time and response time respectively, and ms/s denotes the time consumed by each sample. The data is bolded to indicate the best-performing result in terms of performance metrics. And “Our method” is bolded to distinguish other methods. |