Research Article
Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks
Table 5
Training time of comparable methods.
| Model | Time (seconds) |
| DT | 0.69 | NB | 0.16 | SVM | 750.88 | RF | 1.56 |
| Emb+Conv+Conv+Pool+FC | 22.07 | Conv+Conv+Pool+FC | 21.12 | Emb+Conv+Pool+FC | 13.85 | Emb+Conv+Conv+FC | 31.52 | Emb+Conv+Conv+Conv+Pool+FC | 23.16 |
|
|