Table 3 Distribution of infection types and their instances.
From: Transfer learning with XAI for robust malware and IoT network security
Malware type | Infectious file | Instances |
|---|---|---|
Trojan Horse | Zeus | 195 |
Emotet | 196 | |
Refroso | 200 | |
Scar | 200 | |
Reconyc | 157 | |
Spyware | 180Solutions | 200 |
Coolwebsearch | 200 | |
Gator | 200 | |
Transponder | 241 | |
TIBS | 141 | |
Ransomware | Conti | 200 |
MAZE | 195 | |
Pysa | 171 | |
Ako | 200 | |
Shade | 220 |