Research Article
Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD
Table 2
Data samples count by class.
| ||||||||||||||||||||||
DangerousObject is a malicious software that was detected by KL Cloud Technologies but was not classified exactly. |