Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality. Allix, K., Bissyandé, T. F., Jérome, Q., Klein, J., State, R., & Le Traon, Y. In Proceedings of Conference on Data and Application Security and Privacy (CODASPY), pages 163-166, 2014. Paper bibtex @inproceedings{ dblp1671615,
title = {Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality},
author = {Kevin Allix and Tegawendé F. Bissyandé and Quentin Jérome and Jacques Klein and Radu State and Yves Le Traon},
author_short = {Allix, K. and Bissyandé, T. F. and Jérome, Q. and Klein, J. and State, R. and Le Traon, Y.},
bibtype = {inproceedings},
type = {inproceedings},
year = {2014},
key = {dblp1671615},
id = {dblp1671615},
biburl = {http://www.dblp.org/rec/bibtex/conf/codaspy/AllixBJKST14},
url = {http://doi.acm.org/10.1145/2557547.2557587},
conference = {CODASPY},
pages = {163-166},
text = {CODASPY 2014:163-166},
booktitle = {Proceedings of Conference on Data and Application Security and Privacy (CODASPY)}
}
Downloads: 0
{"_id":"nwHBx9BYSbgWDEWRh","bibbaseid":"allix-bissyand-jrome-klein-state-letraon-largescalemachinelearningbasedmalwaredetectionconfrontingthe10foldcrossvalidationschemewithreality-2014","downloads":0,"creationDate":"2015-07-23T10:26:16.591Z","title":"Large-scale machine learning-based malware detection: confronting the \"10-fold cross validation\" scheme with reality","author_short":["Allix, K.","Bissyandé, T. F.","Jérome, Q.","Klein, J.","State, R.","Le Traon, Y."],"year":2014,"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/codaspy/AllixBJKST14","bibdata":{"title":"Large-scale machine learning-based malware detection: confronting the \"10-fold cross validation\" scheme with reality","author":["Kevin Allix","Tegawendé F. Bissyandé","Quentin Jérome","Jacques Klein","Radu State","Yves Le Traon"],"author_short":["Allix, K.","Bissyandé, T. F.","Jérome, Q.","Klein, J.","State, R.","Le Traon, Y."],"bibtype":"inproceedings","type":"inproceedings","year":"2014","key":"dblp1671615","id":"dblp1671615","biburl":"http://www.dblp.org/rec/bibtex/conf/codaspy/AllixBJKST14","url":"http://doi.acm.org/10.1145/2557547.2557587","conference":"CODASPY","pages":"163-166","text":"CODASPY 2014:163-166","booktitle":"Proceedings of Conference on Data and Application Security and Privacy (CODASPY)","bibtex":"@inproceedings{ dblp1671615,\n title = {Large-scale machine learning-based malware detection: confronting the \"10-fold cross validation\" scheme with reality},\n author = {Kevin Allix and Tegawendé F. Bissyandé and Quentin Jérome and Jacques Klein and Radu State and Yves Le Traon},\n author_short = {Allix, K. and Bissyandé, T. F. and Jérome, Q. and Klein, J. and State, R. and Le Traon, Y.},\n bibtype = {inproceedings},\n type = {inproceedings},\n year = {2014},\n key = {dblp1671615},\n id = {dblp1671615},\n biburl = {http://www.dblp.org/rec/bibtex/conf/codaspy/AllixBJKST14},\n url = {http://doi.acm.org/10.1145/2557547.2557587},\n conference = {CODASPY},\n pages = {163-166},\n text = {CODASPY 2014:163-166},\n booktitle = {Proceedings of Conference on Data and Application Security and Privacy (CODASPY)}\n}","bibbaseid":"allix-bissyand-jrome-klein-state-letraon-largescalemachinelearningbasedmalwaredetectionconfrontingthe10foldcrossvalidationschemewithreality-2014","role":"author","urls":{"Paper":"http://doi.acm.org/10.1145/2557547.2557587"},"downloads":0},"search_terms":["large","scale","machine","learning","based","malware","detection","confronting","fold","cross","validation","scheme","reality","allix","bissyandé","jérome","klein","state","le traon"],"keywords":[],"authorIDs":[],"dataSources":["CGuDs4Mx3NFt6nuAs"]}