Constructing Polymorphic Virus Analysis System Using Behavior Detection Approach
The current antivirus products were only able to detect the existence of viruses, but it could not record the activity or behavior of viruses. Inability of antivirus to record the viruses' behavior made difficult certain users who want to know the behavior of viruses as well as to know the cate...
| المؤلف الرئيسي: | Fauzi Adi, Rafrastara |
|---|---|
| التنسيق: | أطروحة |
| اللغة: | الإنجليزية |
| منشور في: |
2010
|
| الموضوعات: | |
| الوصول للمادة أونلاين: | http://eprints.utem.edu.my/id/eprint/15266/1/Constructing%20Polymorphic%20Virus%20Analysis%20System%20Using%20Behavior%20Detection%20Approach.pdf |
مواد مشابهة
Constructing polymorphic virus analysis system using behavior detection approach
حسب: Rasrastara, Fauzi Adi
منشور في: (2010)
حسب: Rasrastara, Fauzi Adi
منشور في: (2010)
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
حسب: Barkah, Azhari Shouni
منشور في: (2025)
حسب: Barkah, Azhari Shouni
منشور في: (2025)
Voltage instability analysis of electric power systems using artificial neural network based approach
حسب: Mohamad Nor, Ahmad Fateh
منشور في: (2017)
حسب: Mohamad Nor, Ahmad Fateh
منشور في: (2017)
Insider threats detection model for email content using statistical analysis
حسب: Mohammad, Nur Ameera Natasha
منشور في: (2022)
حسب: Mohammad, Nur Ameera Natasha
منشور في: (2022)
Duplicates detection approach within incomplete data sets using dynamic sorting key and hot deck compensation method
حسب: Abdulrahim, Abdulrazzak Ali Mohamed
منشور في: (2022)
حسب: Abdulrahim, Abdulrazzak Ali Mohamed
منشور في: (2022)
Dimension Reduction For Classification Using Principal Component Analysis (PCA) To Detect Malicious Executables
حسب: Jamal, Zalifh
منشور في: (2017)
حسب: Jamal, Zalifh
منشور في: (2017)
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
حسب: Mohd Foozy, Cik Feresa
منشور في: (2017)
حسب: Mohd Foozy, Cik Feresa
منشور في: (2017)
Analysis Of Continuous And Discrete Control Systems Using PID Controller
حسب: Khalaf, Aswaq Abdulameer
منشور في: (2016)
حسب: Khalaf, Aswaq Abdulameer
منشور في: (2016)
Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters
حسب: Abusalama, Jawad
منشور في: (2025)
حسب: Abusalama, Jawad
منشور في: (2025)
Hybrid fuzzy analytical hierarchy process with fuzzy inference system on ranking stem approach towards blended learning in mathematics
حسب: Durrani Aimi, Abdul Malik
منشور في: (2022)
حسب: Durrani Aimi, Abdul Malik
منشور في: (2022)
Hybridization Of Deterministic And Metaheuristic Approaches In Global Optimization
حسب: Goh, Khang Wen
منشور في: (2019)
حسب: Goh, Khang Wen
منشور في: (2019)
Automated Deform Detection For Automotive Body Panels Using Image Processing Techniques
حسب: Edris, Muhammad Zuhair Bolqiah
منشور في: (2016)
حسب: Edris, Muhammad Zuhair Bolqiah
منشور في: (2016)
An enhanced metaheuristic approach to solve quadratic assignment problem using hybrid technique
حسب: Hameed, Asaad Shakir
منشور في: (2021)
حسب: Hameed, Asaad Shakir
منشور في: (2021)
Improved robust estimator and clustering procedures for multivariate outliers detection
حسب: Sharifah Sakinah, Syed Abd Mutalib
منشور في: (2023)
حسب: Sharifah Sakinah, Syed Abd Mutalib
منشور في: (2023)
Detection and prevention for SQL injection attacks in stored procedures using real time web application
حسب: Salih Ali, Nabeel
منشور في: (2015)
حسب: Salih Ali, Nabeel
منشور في: (2015)
Design and evaluation of mobile educational game using m-learning approach for secondary school students
حسب: Yahya, Fatin Aliah
منشور في: (2021)
حسب: Yahya, Fatin Aliah
منشور في: (2021)
An enhanced performance model for metamorphic computer virus classification and detectioN
حسب: Basharirad, Babak
منشور في: (2013)
حسب: Basharirad, Babak
منشور في: (2013)
Practical approach to knowledge-based question answering with natural language understanding and advanced reasoning
حسب: Wilson, Wong Yik Sen
منشور في: (2005)
حسب: Wilson, Wong Yik Sen
منشور في: (2005)
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
حسب: Mustafa, Nuridawati
منشور في: (2020)
حسب: Mustafa, Nuridawati
منشور في: (2020)
Predictive modelling of student academic performance using machine learning approaches : a case study in universiti islam pahang sultan ahmad shah
حسب: Nurul Habibah, Abdul Rahman
منشور في: (2024)
حسب: Nurul Habibah, Abdul Rahman
منشور في: (2024)
Development of dance movement model using Laban movement analysis
حسب: Sutopo, Joko
منشور في: (2023)
حسب: Sutopo, Joko
منشور في: (2023)
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
حسب: Ong, Phaik Ling
منشور في: (2016)
حسب: Ong, Phaik Ling
منشور في: (2016)
Wastewater treatment process: a modified model for oxidation pond
حسب: Syafiqah Hanis, Mohd Fauzi
منشور في: (2021)
حسب: Syafiqah Hanis, Mohd Fauzi
منشور في: (2021)
Compression Molded Kenaf/Polypropylene (K/PP) Composite : Determination Of Impact Properties Using Design Of Experiment (DOE) Analysis
حسب: Loh, Xiao Hui
منشور في: (2017)
حسب: Loh, Xiao Hui
منشور في: (2017)
Analysis and effectiveness of signature based in detecting metamorphic virus
حسب: Md. Sharif, Syahrizal Azmir
منشور في: (2010)
حسب: Md. Sharif, Syahrizal Azmir
منشور في: (2010)
Modelling of n-TH order limit language using automata theory in DNA splicing system
حسب: Siti Hajar, Mohd Khairuddin
منشور في: (2022)
حسب: Siti Hajar, Mohd Khairuddin
منشور في: (2022)
Enhance Keystroke Dynamic For Online Based System
حسب: Teh, Teck Guan
منشور في: (2017)
حسب: Teh, Teck Guan
منشور في: (2017)
The relationship between quality system factors, satisfaction, monetary cost and continuance intention to use M-health
حسب: Alblooshi, Halima Mohammed Murad Karam
منشور في: (2021)
حسب: Alblooshi, Halima Mohammed Murad Karam
منشور في: (2021)
Supplier selection model for decision making in railway information system
حسب: Jayakrishnan, Mailasan
منشور في: (2022)
حسب: Jayakrishnan, Mailasan
منشور في: (2022)
Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout
حسب: Dzakiyullah, Nur Rachman
منشور في: (2025)
حسب: Dzakiyullah, Nur Rachman
منشور في: (2025)
Information quality structure framework in developing an information security management system (ISMS)
حسب: Palaniappan, P Siva Shamala
منشور في: (2017)
حسب: Palaniappan, P Siva Shamala
منشور في: (2017)
The Impact Of User Interface Design Element For Doctor Satisfaction On Electronic Medical Record System
حسب: Zakaria, Nuur Farhana Shatilah
منشور في: (2016)
حسب: Zakaria, Nuur Farhana Shatilah
منشور في: (2016)
Parameter Magnitude-Based Information Criterion For Optimum Model Structure Selection In System Identification
حسب: Mohd Nasir, Abdul Rahman
منشور في: (2020)
حسب: Mohd Nasir, Abdul Rahman
منشور في: (2020)
Flexible lot size for kanban system to reduce material overflow in hard disc assembly process
حسب: Astuti, Fatma Hermining
منشور في: (2015)
حسب: Astuti, Fatma Hermining
منشور في: (2015)
Integrated health information systems framework in post natal care for modern and traditional Malay medicine
حسب: Raja Ikram, Raja Rina
منشور في: (2017)
حسب: Raja Ikram, Raja Rina
منشور في: (2017)
A new human-centric model of airport smart security system to enhance the passenger experience
حسب: Almarri, Ghalib Abdulla
منشور في: (2021)
حسب: Almarri, Ghalib Abdulla
منشور في: (2021)
Queueing theory based model and network analysis for predicting the transmission and control of ebola virus disease
حسب: Ogochukwu Dike, Chinyere
منشور في: (2018)
حسب: Ogochukwu Dike, Chinyere
منشور في: (2018)
Big data technology information extraction and fusion from non-homogenous web data sources
حسب: Lee, Qi Zian
منشور في: (2025)
حسب: Lee, Qi Zian
منشور في: (2025)
Constructing new control points for Bézier interpolating polynomials using new geometrical approach
حسب: Fadhel, Mustafa Abbas Fadhel
منشور في: (2022)
حسب: Fadhel, Mustafa Abbas Fadhel
منشور في: (2022)
An Innovative Signature Detection System for Polymorphic and Monomorphic Internet Worms Detection and Containment
حسب: Rasheed, Mohammad M.
منشور في: (2012)
حسب: Rasheed, Mohammad M.
منشور في: (2012)
مواد مشابهة
-
Constructing polymorphic virus analysis system using behavior detection approach
حسب: Rasrastara, Fauzi Adi
منشور في: (2010) -
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
حسب: Barkah, Azhari Shouni
منشور في: (2025) -
Voltage instability analysis of electric power systems using artificial neural network based approach
حسب: Mohamad Nor, Ahmad Fateh
منشور في: (2017) -
Insider threats detection model for email content using statistical analysis
حسب: Mohammad, Nur Ameera Natasha
منشور في: (2022) -
Duplicates detection approach within incomplete data sets using dynamic sorting key and hot deck compensation method
حسب: Abdulrahim, Abdulrazzak Ali Mohamed
منشور في: (2022)