Constructing Polymorphic Virus Analysis System Using Behavior Detection Approach
The current antivirus products were only able to detect the existence of viruses, but it could not record the activity or behavior of viruses. Inability of antivirus to record the viruses' behavior made difficult certain users who want to know the behavior of viruses as well as to know the cate...
| Main Author: | Fauzi Adi, Rafrastara |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/15266/1/Constructing%20Polymorphic%20Virus%20Analysis%20System%20Using%20Behavior%20Detection%20Approach.pdf |
Similar Items
Constructing polymorphic virus analysis system using behavior detection approach
by: Rasrastara, Fauzi Adi
Published: (2010)
by: Rasrastara, Fauzi Adi
Published: (2010)
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
by: Barkah, Azhari Shouni
Published: (2025)
by: Barkah, Azhari Shouni
Published: (2025)
Voltage instability analysis of electric power systems using artificial neural network based approach
by: Mohamad Nor, Ahmad Fateh
Published: (2017)
by: Mohamad Nor, Ahmad Fateh
Published: (2017)
Insider threats detection model for email content using statistical analysis
by: Mohammad, Nur Ameera Natasha
Published: (2022)
by: Mohammad, Nur Ameera Natasha
Published: (2022)
Duplicates detection approach within incomplete data sets using dynamic sorting key and hot deck compensation method
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)
Dimension Reduction For Classification Using Principal Component Analysis (PCA) To Detect Malicious Executables
by: Jamal, Zalifh
Published: (2017)
by: Jamal, Zalifh
Published: (2017)
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
by: Mohd Foozy, Cik Feresa
Published: (2017)
by: Mohd Foozy, Cik Feresa
Published: (2017)
Analysis Of Continuous And Discrete Control Systems Using PID Controller
by: Khalaf, Aswaq Abdulameer
Published: (2016)
by: Khalaf, Aswaq Abdulameer
Published: (2016)
Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters
by: Abusalama, Jawad
Published: (2025)
by: Abusalama, Jawad
Published: (2025)
Hybrid fuzzy analytical hierarchy process with fuzzy inference system on ranking stem approach towards blended learning in mathematics
by: Durrani Aimi, Abdul Malik
Published: (2022)
by: Durrani Aimi, Abdul Malik
Published: (2022)
Hybridization Of Deterministic And Metaheuristic Approaches In Global Optimization
by: Goh, Khang Wen
Published: (2019)
by: Goh, Khang Wen
Published: (2019)
Automated Deform Detection For Automotive Body Panels Using Image Processing Techniques
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
An enhanced metaheuristic approach to solve quadratic assignment problem using hybrid technique
by: Hameed, Asaad Shakir
Published: (2021)
by: Hameed, Asaad Shakir
Published: (2021)
Improved robust estimator and clustering procedures for multivariate outliers detection
by: Sharifah Sakinah, Syed Abd Mutalib
Published: (2023)
by: Sharifah Sakinah, Syed Abd Mutalib
Published: (2023)
Detection and prevention for SQL injection attacks in stored procedures using real time web application
by: Salih Ali, Nabeel
Published: (2015)
by: Salih Ali, Nabeel
Published: (2015)
Design and evaluation of mobile educational game using m-learning approach for secondary school students
by: Yahya, Fatin Aliah
Published: (2021)
by: Yahya, Fatin Aliah
Published: (2021)
An enhanced performance model for metamorphic computer virus classification and detectioN
by: Basharirad, Babak
Published: (2013)
by: Basharirad, Babak
Published: (2013)
Practical approach to knowledge-based question answering with natural language understanding and advanced reasoning
by: Wilson, Wong Yik Sen
Published: (2005)
by: Wilson, Wong Yik Sen
Published: (2005)
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
by: Mustafa, Nuridawati
Published: (2020)
by: Mustafa, Nuridawati
Published: (2020)
Predictive modelling of student academic performance using machine learning approaches : a case study in universiti islam pahang sultan ahmad shah
by: Nurul Habibah, Abdul Rahman
Published: (2024)
by: Nurul Habibah, Abdul Rahman
Published: (2024)
Development of dance movement model using Laban movement analysis
by: Sutopo, Joko
Published: (2023)
by: Sutopo, Joko
Published: (2023)
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
by: Ong, Phaik Ling
Published: (2016)
by: Ong, Phaik Ling
Published: (2016)
Wastewater treatment process: a modified model for oxidation pond
by: Syafiqah Hanis, Mohd Fauzi
Published: (2021)
by: Syafiqah Hanis, Mohd Fauzi
Published: (2021)
Compression Molded Kenaf/Polypropylene (K/PP) Composite : Determination Of Impact Properties Using Design Of Experiment (DOE) Analysis
by: Loh, Xiao Hui
Published: (2017)
by: Loh, Xiao Hui
Published: (2017)
Analysis and effectiveness of signature based in detecting metamorphic virus
by: Md. Sharif, Syahrizal Azmir
Published: (2010)
by: Md. Sharif, Syahrizal Azmir
Published: (2010)
Modelling of n-TH order limit language using automata theory in DNA splicing system
by: Siti Hajar, Mohd Khairuddin
Published: (2022)
by: Siti Hajar, Mohd Khairuddin
Published: (2022)
Enhance Keystroke Dynamic For Online Based System
by: Teh, Teck Guan
Published: (2017)
by: Teh, Teck Guan
Published: (2017)
The relationship between quality system factors, satisfaction, monetary cost and continuance intention to use M-health
by: Alblooshi, Halima Mohammed Murad Karam
Published: (2021)
by: Alblooshi, Halima Mohammed Murad Karam
Published: (2021)
Supplier selection model for decision making in railway information system
by: Jayakrishnan, Mailasan
Published: (2022)
by: Jayakrishnan, Mailasan
Published: (2022)
Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout
by: Dzakiyullah, Nur Rachman
Published: (2025)
by: Dzakiyullah, Nur Rachman
Published: (2025)
Information quality structure framework in developing an information security management system (ISMS)
by: Palaniappan, P Siva Shamala
Published: (2017)
by: Palaniappan, P Siva Shamala
Published: (2017)
The Impact Of User Interface Design Element For Doctor Satisfaction On Electronic Medical Record System
by: Zakaria, Nuur Farhana Shatilah
Published: (2016)
by: Zakaria, Nuur Farhana Shatilah
Published: (2016)
Parameter Magnitude-Based Information Criterion For Optimum Model Structure Selection In System Identification
by: Mohd Nasir, Abdul Rahman
Published: (2020)
by: Mohd Nasir, Abdul Rahman
Published: (2020)
Flexible lot size for kanban system to reduce material overflow in hard disc assembly process
by: Astuti, Fatma Hermining
Published: (2015)
by: Astuti, Fatma Hermining
Published: (2015)
Integrated health information systems framework in post natal care for modern and traditional Malay medicine
by: Raja Ikram, Raja Rina
Published: (2017)
by: Raja Ikram, Raja Rina
Published: (2017)
A new human-centric model of airport smart security system to enhance the passenger experience
by: Almarri, Ghalib Abdulla
Published: (2021)
by: Almarri, Ghalib Abdulla
Published: (2021)
Queueing theory based model and network analysis for predicting the transmission and control of ebola virus disease
by: Ogochukwu Dike, Chinyere
Published: (2018)
by: Ogochukwu Dike, Chinyere
Published: (2018)
Big data technology information extraction and fusion from non-homogenous web data sources
by: Lee, Qi Zian
Published: (2025)
by: Lee, Qi Zian
Published: (2025)
Constructing new control points for Bézier interpolating polynomials using new geometrical approach
by: Fadhel, Mustafa Abbas Fadhel
Published: (2022)
by: Fadhel, Mustafa Abbas Fadhel
Published: (2022)
An Innovative Signature Detection System for Polymorphic and Monomorphic Internet Worms Detection and Containment
by: Rasheed, Mohammad M.
Published: (2012)
by: Rasheed, Mohammad M.
Published: (2012)
Similar Items
-
Constructing polymorphic virus analysis system using behavior detection approach
by: Rasrastara, Fauzi Adi
Published: (2010) -
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
by: Barkah, Azhari Shouni
Published: (2025) -
Voltage instability analysis of electric power systems using artificial neural network based approach
by: Mohamad Nor, Ahmad Fateh
Published: (2017) -
Insider threats detection model for email content using statistical analysis
by: Mohammad, Nur Ameera Natasha
Published: (2022) -
Duplicates detection approach within incomplete data sets using dynamic sorting key and hot deck compensation method
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)