Constructing Polymorphic Virus Analysis System Using Behavior Detection Approach
The current antivirus products were only able to detect the existence of viruses, but it could not record the activity or behavior of viruses. Inability of antivirus to record the viruses' behavior made difficult certain users who want to know the behavior of viruses as well as to know the cate...
| Main Author: | Fauzi Adi, Rafrastara |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/15266/ http://library.utem.edu.my:8000/elmu/index.jsp?module=webopac-d&action=fullDisplayRetriever.jsp&szMaterialNo=0000063239 |
| Abstract | Abstract here |
Similar Items
Constructing polymorphic virus analysis system using behavior detection approach
by: Rasrastara, Fauzi Adi
Published: (2010)
by: Rasrastara, Fauzi Adi
Published: (2010)
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
by: Barkah, Azhari Shouni
Published: (2025)
by: Barkah, Azhari Shouni
Published: (2025)
Voltage instability analysis of electric power systems using artificial neural network based approach
by: Mohamad Nor, Ahmad Fateh
Published: (2017)
by: Mohamad Nor, Ahmad Fateh
Published: (2017)
Insider threats detection model for email content using statistical analysis
by: Mohammad, Nur Ameera Natasha
Published: (2022)
by: Mohammad, Nur Ameera Natasha
Published: (2022)
Duplicates detection approach within incomplete data sets using dynamic sorting key and hot deck compensation method
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)
Maritime transportation system, economy distribution and seaport network efficiency using fuzzy data envelopment analysis with clustering approach / Dineswary Nadarajan
by: Dineswary , Nadarajan
Published: (2023)
by: Dineswary , Nadarajan
Published: (2023)
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
by: Mohd Foozy, Cik Feresa
Published: (2017)
by: Mohd Foozy, Cik Feresa
Published: (2017)
Dimension Reduction For Classification Using Principal Component Analysis (PCA) To Detect Malicious Executables
by: Jamal, Zalifh
Published: (2017)
by: Jamal, Zalifh
Published: (2017)
Integrated framework on decentralized E-Government in Iraqi higher education using hybrid approach
by: Fuaad Ali, Ali
Published: (2025)
by: Fuaad Ali, Ali
Published: (2025)
Analysis Of Continuous And Discrete Control Systems Using PID Controller
by: Khalaf, Aswaq Abdulameer
Published: (2016)
by: Khalaf, Aswaq Abdulameer
Published: (2016)
Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters
by: Abusalama, Jawad
Published: (2025)
by: Abusalama, Jawad
Published: (2025)
Optimised hybrid deep learning models for integrated energy modelling and anomaly detection under IPMVP compliance
by: Sukarti, Suziee
Published: (2025)
by: Sukarti, Suziee
Published: (2025)
Hybrid fuzzy analytical hierarchy process with fuzzy inference system on ranking stem approach towards blended learning in mathematics
by: Durrani Aimi, Abdul Malik
Published: (2022)
by: Durrani Aimi, Abdul Malik
Published: (2022)
Automated Deform Detection For Automotive Body Panels Using Image Processing Techniques
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
Outlier detection in cylindrical data / Nurul Hidayah Sadikon
by: Nurul Hidayah , Sadikon
Published: (2018)
by: Nurul Hidayah , Sadikon
Published: (2018)
Hybridization Of Deterministic And Metaheuristic Approaches In Global Optimization
by: Goh, Khang Wen
Published: (2019)
by: Goh, Khang Wen
Published: (2019)
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
by: Mohd Yusoff, Mohd Izhan
Published: (2014)
by: Mohd Yusoff, Mohd Izhan
Published: (2014)
An enhanced metaheuristic approach to solve quadratic assignment problem using hybrid technique
by: Hameed, Asaad Shakir
Published: (2021)
by: Hameed, Asaad Shakir
Published: (2021)
A comparative analysis of Parkinson’s disease classification using artificial intelligent techniques for mobile application
by: Lee, Teng Hong
Published: (2025)
by: Lee, Teng Hong
Published: (2025)
Detection and prevention for SQL injection attacks in stored procedures using real time web application
by: Salih Ali, Nabeel
Published: (2015)
by: Salih Ali, Nabeel
Published: (2015)
Improved robust estimator and clustering procedures for multivariate outliers detection
by: Sharifah Sakinah, Syed Abd Mutalib
Published: (2023)
by: Sharifah Sakinah, Syed Abd Mutalib
Published: (2023)
Design and evaluation of mobile educational game using m-learning approach for secondary school students
by: Yahya, Fatin Aliah
Published: (2021)
by: Yahya, Fatin Aliah
Published: (2021)
Transformer-based sentiment analysis classification in natural language processing for Bahasa Melayu
by: Zulkalnain, Mohd Asyraf
Published: (2025)
by: Zulkalnain, Mohd Asyraf
Published: (2025)
Estimation and outlier detection of random coefficient autoregressive models / Norli Anida binti Abdullah
by: Abdullah, Norli Anida
Published: (2009)
by: Abdullah, Norli Anida
Published: (2009)
Bayesian approach to errors-in-variables in count data regression models / Nur Aainaa Rozliman
by: Nur Aainaa , Rozliman
Published: (2018)
by: Nur Aainaa , Rozliman
Published: (2018)
Practical approach to knowledge-based question answering with natural language understanding and advanced reasoning
by: Wilson, Wong Yik Sen
Published: (2005)
by: Wilson, Wong Yik Sen
Published: (2005)
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
by: Mustafa, Nuridawati
Published: (2020)
by: Mustafa, Nuridawati
Published: (2020)
Predictive modelling of student academic performance using machine learning approaches : a case study in universiti islam pahang sultan ahmad shah
by: Nurul Habibah, Abdul Rahman
Published: (2024)
by: Nurul Habibah, Abdul Rahman
Published: (2024)
Accurate identification of thirteen fly species from three families using wing venation patterns with machine learning approaches / Ling Min Hao
by: Ling Min Hao, Min Hao
Published: (2024)
by: Ling Min Hao, Min Hao
Published: (2024)
Constructing new control points for Bézier interpolating polynomials using new geometrical approach
by: Fadhel, Mustafa Abbas Fadhel
Published: (2022)
by: Fadhel, Mustafa Abbas Fadhel
Published: (2022)
Development of dance movement model using Laban movement analysis
by: Sutopo, Joko
Published: (2023)
by: Sutopo, Joko
Published: (2023)
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
by: Ong, Phaik Ling
Published: (2016)
by: Ong, Phaik Ling
Published: (2016)
Identifying remarkable researchers using citation network analysis / Ephrance Abu Ujum
by: Ujum, Ephrance Abu
Published: (2014)
by: Ujum, Ephrance Abu
Published: (2014)
Wastewater treatment process: a modified model for oxidation pond
by: Syafiqah Hanis, Mohd Fauzi
Published: (2021)
by: Syafiqah Hanis, Mohd Fauzi
Published: (2021)
Compression Molded Kenaf/Polypropylene (K/PP) Composite : Determination Of Impact Properties Using Design Of Experiment (DOE) Analysis
by: Loh, Xiao Hui
Published: (2017)
by: Loh, Xiao Hui
Published: (2017)
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
by: Tey, Siew Kian
Published: (2009)
by: Tey, Siew Kian
Published: (2009)
Modelling of n-TH order limit language using automata theory in DNA splicing system
by: Siti Hajar, Mohd Khairuddin
Published: (2022)
by: Siti Hajar, Mohd Khairuddin
Published: (2022)
Tuberculosis Model : A Mathematical Analysis / Nadhirah bt Abdul Halim
by: Abdul Halim, Nadhirah
Published: (2013)
by: Abdul Halim, Nadhirah
Published: (2013)
The relationship between quality system factors, satisfaction, monetary cost and continuance intention to use M-health
by: Alblooshi, Halima Mohammed Murad Karam
Published: (2021)
by: Alblooshi, Halima Mohammed Murad Karam
Published: (2021)
Enhance Keystroke Dynamic For Online Based System
by: Teh, Teck Guan
Published: (2017)
by: Teh, Teck Guan
Published: (2017)
Similar Items
-
Constructing polymorphic virus analysis system using behavior detection approach
by: Rasrastara, Fauzi Adi
Published: (2010) -
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
by: Barkah, Azhari Shouni
Published: (2025) -
Voltage instability analysis of electric power systems using artificial neural network based approach
by: Mohamad Nor, Ahmad Fateh
Published: (2017) -
Insider threats detection model for email content using statistical analysis
by: Mohammad, Nur Ameera Natasha
Published: (2022) -
Duplicates detection approach within incomplete data sets using dynamic sorting key and hot deck compensation method
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)
