Research Article

Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks

Table 5

Training time of comparable methods.

ModelTime (seconds)

DT0.69
NB0.16
SVM750.88
RF1.56

Emb+Conv+Conv+Pool+FC 22.07
Conv+Conv+Pool+FC21.12
Emb+Conv+Pool+FC13.85
Emb+Conv+Conv+FC31.52
Emb+Conv+Conv+Conv+Pool+FC23.16