Return to Article Details Comparative analysis of machine learning methods for detecting malicious files Download Download PDF