Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality. Allix, K., Bissyandé, T. F., Jérome, Q., Klein, J., State, R., & Le Traon, Y. In Proceedings of Conference on Data and Application Security and Privacy (CODASPY), pages 163-166, 2014.  ![link Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality [link]](https://bibbase.org/img/filetypes/link.svg) Paper  bibtex
Paper  bibtex   @inproceedings{ dblp1671615,
  title = {Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality},
  author = {Kevin Allix and Tegawendé F. Bissyandé and Quentin Jérome and Jacques Klein and Radu State and Yves Le Traon},
  author_short = {Allix, K. and Bissyandé, T. F. and Jérome, Q. and Klein, J. and State, R. and Le Traon, Y.},
  bibtype = {inproceedings},
  type = {inproceedings},
  year = {2014},
  key = {dblp1671615},
  id = {dblp1671615},
  biburl = {http://www.dblp.org/rec/bibtex/conf/codaspy/AllixBJKST14},
  url = {http://doi.acm.org/10.1145/2557547.2557587},
  conference = {CODASPY},
  pages = {163-166},
  text = {CODASPY 2014:163-166},
  booktitle = {Proceedings of Conference on Data and Application Security and Privacy (CODASPY)}
} 
Downloads: 0
{"_id":"nwHBx9BYSbgWDEWRh","bibbaseid":"allix-bissyand-jrome-klein-state-letraon-largescalemachinelearningbasedmalwaredetectionconfrontingthe10foldcrossvalidationschemewithreality-2014","downloads":0,"creationDate":"2015-07-23T10:26:16.591Z","title":"Large-scale machine learning-based malware detection: confronting the \"10-fold cross validation\" scheme with reality","author_short":["Allix, K.","Bissyandé, T. F.","Jérome, Q.","Klein, J.","State, R.","Le Traon, Y."],"year":2014,"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/codaspy/AllixBJKST14","bibdata":{"title":"Large-scale machine learning-based malware detection: confronting the \"10-fold cross validation\" scheme with reality","author":["Kevin Allix","Tegawendé F. Bissyandé","Quentin Jérome","Jacques Klein","Radu State","Yves Le Traon"],"author_short":["Allix, K.","Bissyandé, T. F.","Jérome, Q.","Klein, J.","State, R.","Le Traon, Y."],"bibtype":"inproceedings","type":"inproceedings","year":"2014","key":"dblp1671615","id":"dblp1671615","biburl":"http://www.dblp.org/rec/bibtex/conf/codaspy/AllixBJKST14","url":"http://doi.acm.org/10.1145/2557547.2557587","conference":"CODASPY","pages":"163-166","text":"CODASPY 2014:163-166","booktitle":"Proceedings of Conference on Data and Application Security and Privacy (CODASPY)","bibtex":"@inproceedings{ dblp1671615,\n  title = {Large-scale machine learning-based malware detection: confronting the \"10-fold cross validation\" scheme with reality},\n  author = {Kevin Allix and Tegawendé F. Bissyandé and Quentin Jérome and Jacques Klein and Radu State and Yves Le Traon},\n  author_short = {Allix, K. and Bissyandé, T. F. and Jérome, Q. and Klein, J. and State, R. and Le Traon, Y.},\n  bibtype = {inproceedings},\n  type = {inproceedings},\n  year = {2014},\n  key = {dblp1671615},\n  id = {dblp1671615},\n  biburl = {http://www.dblp.org/rec/bibtex/conf/codaspy/AllixBJKST14},\n  url = {http://doi.acm.org/10.1145/2557547.2557587},\n  conference = {CODASPY},\n  pages = {163-166},\n  text = {CODASPY 2014:163-166},\n  booktitle = {Proceedings of Conference on Data and Application Security and Privacy (CODASPY)}\n}","bibbaseid":"allix-bissyand-jrome-klein-state-letraon-largescalemachinelearningbasedmalwaredetectionconfrontingthe10foldcrossvalidationschemewithreality-2014","role":"author","urls":{"Paper":"http://doi.acm.org/10.1145/2557547.2557587"},"downloads":0},"search_terms":["large","scale","machine","learning","based","malware","detection","confronting","fold","cross","validation","scheme","reality","allix","bissyandé","jérome","klein","state","le traon"],"keywords":[],"authorIDs":[],"dataSources":["CGuDs4Mx3NFt6nuAs"]}