Isawa, Ryoichi, et al. "An accurate packer identification method using support vector machine." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 97.1 (2014): 253-263.
Nataraj, Lakshmanan, et al. "Malware images: visualization and automatic classification." Proceedings of the 8th international symposium on visualization for cyber security. 2011.
Raff, Edward, et al. "Malware detection by eating a whole exe." Workshops at the thirty-second AAAI conference on artificial intelligence. 2018.
Minami Someya, Yuhei Otsubo, and Akira Otsuka. "FCGAT: Interpretable malware classification method using function call graph and attention mechanism." Proc. Netw. Distrib. Syst. Secur.(NDSS) Symp.2023.
CBOW: Mikolov, Tomas et al. “Efficient Estimation of Word Representations in Vector Space.” International Conference on Learning Representations (2013).
skip-gram: Mikolov, Tomas et al. “Distributed Representations of Words and Phrases and their Compositionality.” Neural Information Processing Systems (2013).
https://rada.re/
https://radimrehurek.com/gensim
https://scikit-learn.org/stable/
Scarselli, F, et al. (2008). The graph neural network model. IEEE transactions on neural networks, 20(1), 61-80.
35 P. Veličković, et al."Graph Attention Networks"6th International Conference on Learning Representations.2017.