Constructing polymorphic virus analysis system using behavior detection approach
The current antivirus products were only able to detect the existence of viruses, but it could not record the activity or behavior of viruses. Inability of antivirus to record the viruses' behavior made difficult certain users who want to know the behavior of viruses as well as to know the cate...
| Auteur principal: | Rasrastara, Fauzi Adi |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2010
|
| Sujets: | |
| Accès en ligne: | http://eprints.utem.edu.my/id/eprint/14530/ |
| Abstract | Abstract here |
Documents similaires
Constructing Polymorphic Virus Analysis System Using Behavior Detection Approach
par: Fauzi Adi, Rafrastara
Publié: (2010)
par: Fauzi Adi, Rafrastara
Publié: (2010)
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
par: Barkah, Azhari Shouni
Publié: (2025)
par: Barkah, Azhari Shouni
Publié: (2025)
Voltage instability analysis of electric power systems using artificial neural network based approach
par: Mohamad Nor, Ahmad Fateh
Publié: (2017)
par: Mohamad Nor, Ahmad Fateh
Publié: (2017)
Insider threats detection model for email content using statistical analysis
par: Mohammad, Nur Ameera Natasha
Publié: (2022)
par: Mohammad, Nur Ameera Natasha
Publié: (2022)
Duplicates detection approach within incomplete data sets using dynamic sorting key and hot deck compensation method
par: Abdulrahim, Abdulrazzak Ali Mohamed
Publié: (2022)
par: Abdulrahim, Abdulrazzak Ali Mohamed
Publié: (2022)
Maritime transportation system, economy distribution and seaport network efficiency using fuzzy data envelopment analysis with clustering approach / Dineswary Nadarajan
par: Dineswary , Nadarajan
Publié: (2023)
par: Dineswary , Nadarajan
Publié: (2023)
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
par: Mohd Foozy, Cik Feresa
Publié: (2017)
par: Mohd Foozy, Cik Feresa
Publié: (2017)
Dimension Reduction For Classification Using Principal Component Analysis (PCA) To Detect Malicious Executables
par: Jamal, Zalifh
Publié: (2017)
par: Jamal, Zalifh
Publié: (2017)
Integrated framework on decentralized E-Government in Iraqi higher education using hybrid approach
par: Fuaad Ali, Ali
Publié: (2025)
par: Fuaad Ali, Ali
Publié: (2025)
Analysis Of Continuous And Discrete Control Systems Using PID Controller
par: Khalaf, Aswaq Abdulameer
Publié: (2016)
par: Khalaf, Aswaq Abdulameer
Publié: (2016)
Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters
par: Abusalama, Jawad
Publié: (2025)
par: Abusalama, Jawad
Publié: (2025)
Optimised hybrid deep learning models for integrated energy modelling and anomaly detection under IPMVP compliance
par: Sukarti, Suziee
Publié: (2025)
par: Sukarti, Suziee
Publié: (2025)
Hybrid fuzzy analytical hierarchy process with fuzzy inference system on ranking stem approach towards blended learning in mathematics
par: Durrani Aimi, Abdul Malik
Publié: (2022)
par: Durrani Aimi, Abdul Malik
Publié: (2022)
Automated Deform Detection For Automotive Body Panels Using Image Processing Techniques
par: Edris, Muhammad Zuhair Bolqiah
Publié: (2016)
par: Edris, Muhammad Zuhair Bolqiah
Publié: (2016)
Outlier detection in cylindrical data / Nurul Hidayah Sadikon
par: Nurul Hidayah , Sadikon
Publié: (2018)
par: Nurul Hidayah , Sadikon
Publié: (2018)
Hybridization Of Deterministic And Metaheuristic Approaches In Global Optimization
par: Goh, Khang Wen
Publié: (2019)
par: Goh, Khang Wen
Publié: (2019)
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
par: Mohd Yusoff, Mohd Izhan
Publié: (2014)
par: Mohd Yusoff, Mohd Izhan
Publié: (2014)
An enhanced metaheuristic approach to solve quadratic assignment problem using hybrid technique
par: Hameed, Asaad Shakir
Publié: (2021)
par: Hameed, Asaad Shakir
Publié: (2021)
Improved robust estimator and clustering procedures for multivariate outliers detection
par: Sharifah Sakinah, Syed Abd Mutalib
Publié: (2023)
par: Sharifah Sakinah, Syed Abd Mutalib
Publié: (2023)
Detection and prevention for SQL injection attacks in stored procedures using real time web application
par: Salih Ali, Nabeel
Publié: (2015)
par: Salih Ali, Nabeel
Publié: (2015)
A comparative analysis of Parkinson’s disease classification using artificial intelligent techniques for mobile application
par: Lee, Teng Hong
Publié: (2025)
par: Lee, Teng Hong
Publié: (2025)
Design and evaluation of mobile educational game using m-learning approach for secondary school students
par: Yahya, Fatin Aliah
Publié: (2021)
par: Yahya, Fatin Aliah
Publié: (2021)
Transformer-based sentiment analysis classification in natural language processing for Bahasa Melayu
par: Zulkalnain, Mohd Asyraf
Publié: (2025)
par: Zulkalnain, Mohd Asyraf
Publié: (2025)
Estimation and outlier detection of random coefficient autoregressive models / Norli Anida binti Abdullah
par: Abdullah, Norli Anida
Publié: (2009)
par: Abdullah, Norli Anida
Publié: (2009)
Bayesian approach to errors-in-variables in count data regression models / Nur Aainaa Rozliman
par: Nur Aainaa , Rozliman
Publié: (2018)
par: Nur Aainaa , Rozliman
Publié: (2018)
Practical approach to knowledge-based question answering with natural language understanding and advanced reasoning
par: Wilson, Wong Yik Sen
Publié: (2005)
par: Wilson, Wong Yik Sen
Publié: (2005)
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
par: Mustafa, Nuridawati
Publié: (2020)
par: Mustafa, Nuridawati
Publié: (2020)
Predictive modelling of student academic performance using machine learning approaches : a case study in universiti islam pahang sultan ahmad shah
par: Nurul Habibah, Abdul Rahman
Publié: (2024)
par: Nurul Habibah, Abdul Rahman
Publié: (2024)
Accurate identification of thirteen fly species from three families using wing venation patterns with machine learning approaches / Ling Min Hao
par: Ling Min Hao, Min Hao
Publié: (2024)
par: Ling Min Hao, Min Hao
Publié: (2024)
Constructing new control points for Bézier interpolating polynomials using new geometrical approach
par: Fadhel, Mustafa Abbas Fadhel
Publié: (2022)
par: Fadhel, Mustafa Abbas Fadhel
Publié: (2022)
Development of dance movement model using Laban movement analysis
par: Sutopo, Joko
Publié: (2023)
par: Sutopo, Joko
Publié: (2023)
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
par: Ong, Phaik Ling
Publié: (2016)
par: Ong, Phaik Ling
Publié: (2016)
Identifying remarkable researchers using citation network analysis / Ephrance Abu Ujum
par: Ujum, Ephrance Abu
Publié: (2014)
par: Ujum, Ephrance Abu
Publié: (2014)
Wastewater treatment process: a modified model for oxidation pond
par: Syafiqah Hanis, Mohd Fauzi
Publié: (2021)
par: Syafiqah Hanis, Mohd Fauzi
Publié: (2021)
Compression Molded Kenaf/Polypropylene (K/PP) Composite : Determination Of Impact Properties Using Design Of Experiment (DOE) Analysis
par: Loh, Xiao Hui
Publié: (2017)
par: Loh, Xiao Hui
Publié: (2017)
Mathematical modeling on the spread of Zika virus infection using compartment models
par: Yue, Zongmin
Publié: (2024)
par: Yue, Zongmin
Publié: (2024)
Tuberculosis Model : A Mathematical Analysis / Nadhirah bt Abdul Halim
par: Abdul Halim, Nadhirah
Publié: (2013)
par: Abdul Halim, Nadhirah
Publié: (2013)
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
par: Tey, Siew Kian
Publié: (2009)
par: Tey, Siew Kian
Publié: (2009)
Modelling of n-TH order limit language using automata theory in DNA splicing system
par: Siti Hajar, Mohd Khairuddin
Publié: (2022)
par: Siti Hajar, Mohd Khairuddin
Publié: (2022)
The relationship between quality system factors, satisfaction, monetary cost and continuance intention to use M-health
par: Alblooshi, Halima Mohammed Murad Karam
Publié: (2021)
par: Alblooshi, Halima Mohammed Murad Karam
Publié: (2021)
Documents similaires
-
Constructing Polymorphic Virus Analysis System Using Behavior Detection Approach
par: Fauzi Adi, Rafrastara
Publié: (2010) -
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
par: Barkah, Azhari Shouni
Publié: (2025) -
Voltage instability analysis of electric power systems using artificial neural network based approach
par: Mohamad Nor, Ahmad Fateh
Publié: (2017) -
Insider threats detection model for email content using statistical analysis
par: Mohammad, Nur Ameera Natasha
Publié: (2022) -
Duplicates detection approach within incomplete data sets using dynamic sorting key and hot deck compensation method
par: Abdulrahim, Abdulrazzak Ali Mohamed
Publié: (2022)
