Abstract: The traditional rule-based and signature-based methods for detecting malicious files face significant challenges in modern cybersecurity, especially when attackers encode or encrypt ...