Skip to main content

Table 1 List of criteria we used to choose representative work for each research topic

From: Using deep learning to solve computer security challenges: a survey

Order of Criteria for Paper Selection 1 2 3 4
RFBNN (Shin et al. 2015) Pioneer Top Novelty Citation
EKLAVYA (Chua et al. 2017) Top Novelty Citation N/A
ROPNN (Li et al. 2018) Pioneer Novelty Effectiveness N/A
HeNet (Chen et al. 2018) Effectiveness Novelty Citation N/A
Barnum (Yagemann et al. 2019) Pioneer Novelty N/A N/A
CFG-CNN (Phan et al. 2017) Representative N/A N/A N/A
50b(yte)-CNN(Millar et al. 2018) Novelty Effectiveness N/A N/A
PCNN (Zhang et al. 2019) Novelty Effectiveness N/A N/A
Resenberg (Rosenberg et al. 2018) Novelty Effectiveness Top Representative
DeLaRosa (De La Rosa et al. 2018) Novelty Representative N/A N/A
DeepLog (Du et al. 2017) Pioneer Top Citation N/A
DeepMem (Song et al. 2018) Pioneer Top N/A N/A
NeuZZ (Shi and Pei 2019) Novelty Top Effectiveness N/A
Learn & Fuzz (Godefroid et al. 2017) Pioneer Novelty Top N/A