Malware Removal Tools Using Indicators Of Compromise (IOCs)
Nowdays,Malware has become a big disease in a computer science field.Each and every day Malware kept on increasing rapidly.Even with the current removal tools like Kaspersky,Norton,Avast,McAfee and many more,there is still some malware that does not removed.Instead of spending a lot of money and tim...
| Main Author: | Shahrin, Abdullah Azam |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/20939/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=106078 |
| Abstract | Abstract here |
Similar Items
A Dynamic Approach using Indicators of Compromise to Detect Malicious Code
by: Ikenna Rene, Chiadighikaobi
Published: (2018)
by: Ikenna Rene, Chiadighikaobi
Published: (2018)
A completeness evaluation of patient records in medical tourism using completeness evaluation tool
by: Nor Rabbiatun, Mohamed Nazri
Published: (2014)
by: Nor Rabbiatun, Mohamed Nazri
Published: (2014)
A new one parameter family of Archimedean copula and its extensions / Azam Pirmoradian
by: Pirmoradian, Azam
Published: (2013)
by: Pirmoradian, Azam
Published: (2013)
Android mobile malware detection model based on permission features using machine learning approach
by: Sharfah Ratibah, Tuan Mat
Published: (2022)
by: Sharfah Ratibah, Tuan Mat
Published: (2022)
Fuzzy analytical hierarchy process based risk assessment for malware detection in android mobile system
by: Juliza, Mohamad Arif
Published: (2022)
by: Juliza, Mohamad Arif
Published: (2022)
Analysis Of Continuous And Discrete Control Systems Using PID Controller
by: Khalaf, Aswaq Abdulameer
Published: (2016)
by: Khalaf, Aswaq Abdulameer
Published: (2016)
Steganography for securing image data using hybrid SLT and DCT
by: Rachmawanto, Eko Hari
Published: (2012)
by: Rachmawanto, Eko Hari
Published: (2012)
Development of dance movement model using Laban movement analysis
by: Sutopo, Joko
Published: (2023)
by: Sutopo, Joko
Published: (2023)
Insider threats detection model for email content using statistical analysis
by: Mohammad, Nur Ameera Natasha
Published: (2022)
by: Mohammad, Nur Ameera Natasha
Published: (2022)
Constructing Polymorphic Virus Analysis System Using Behavior Detection Approach
by: Fauzi Adi, Rafrastara
Published: (2010)
by: Fauzi Adi, Rafrastara
Published: (2010)
Constructing polymorphic virus analysis system using behavior detection approach
by: Rasrastara, Fauzi Adi
Published: (2010)
by: Rasrastara, Fauzi Adi
Published: (2010)
Automated Deform Detection For Automotive Body Panels Using Image Processing Techniques
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
Open data framework for MTUN academics using open data license as mediator
by: Ismael, Siti Nur' Asyiqin
Published: (2022)
by: Ismael, Siti Nur' Asyiqin
Published: (2022)
An enhanced metaheuristic approach to solve quadratic assignment problem using hybrid technique
by: Hameed, Asaad Shakir
Published: (2021)
by: Hameed, Asaad Shakir
Published: (2021)
Development of novel conversational agent using retrieval-based model and deep learning
by: Leong, Pui Huang
Published: (2021)
by: Leong, Pui Huang
Published: (2021)
Identifying remarkable researchers using citation network analysis / Ephrance Abu Ujum
by: Ujum, Ephrance Abu
Published: (2014)
by: Ujum, Ephrance Abu
Published: (2014)
Dimension Reduction For Classification Using Principal Component Analysis (PCA) To Detect Malicious Executables
by: Jamal, Zalifh
Published: (2017)
by: Jamal, Zalifh
Published: (2017)
A Framework For Accessing Patient Health Records Using Information Communication Technology Devices
by: Mohd Yaacob, Noorayisahbe
Published: (2016)
by: Mohd Yaacob, Noorayisahbe
Published: (2016)
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
by: Mohd Yusoff, Mohd Izhan
Published: (2014)
by: Mohd Yusoff, Mohd Izhan
Published: (2014)
Estimation and outlier detection of random coefficient autoregressive models / Norli Anida binti Abdullah
by: Abdullah, Norli Anida
Published: (2009)
by: Abdullah, Norli Anida
Published: (2009)
A New Technique To Design Coating Structure For Energy Saving Glass Using The Genetic Algorithm
by: Azmin, Farah Ayuni
Published: (2017)
by: Azmin, Farah Ayuni
Published: (2017)
Voltage instability analysis of electric power systems using artificial neural network based approach
by: Mohamad Nor, Ahmad Fateh
Published: (2017)
by: Mohamad Nor, Ahmad Fateh
Published: (2017)
Multi-criteria decision-making using game theory technique with application to oil production and price
by: Muhammad Akram Ramadhan, Ibrahim
Published: (2024)
by: Muhammad Akram Ramadhan, Ibrahim
Published: (2024)
Modelling of n-TH order limit language using automata theory in DNA splicing system
by: Siti Hajar, Mohd Khairuddin
Published: (2022)
by: Siti Hajar, Mohd Khairuddin
Published: (2022)
Design and evaluation of mobile educational game using m-learning approach for secondary school students
by: Yahya, Fatin Aliah
Published: (2021)
by: Yahya, Fatin Aliah
Published: (2021)
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
by: Abu, Md Sahrom
Published: (2021)
by: Abu, Md Sahrom
Published: (2021)
Detection and prevention for SQL injection attacks in stored procedures using real time web application
by: Salih Ali, Nabeel
Published: (2015)
by: Salih Ali, Nabeel
Published: (2015)
Segmentation Of Two Touching Handwritten Arabic Characters Using Overlapping Set Theory And Gradient Orientation
by: Ullah, Inam
Published: (2020)
by: Ullah, Inam
Published: (2020)
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
by: Tey, Siew Kian
Published: (2009)
by: Tey, Siew Kian
Published: (2009)
Prediction Of Musculoskeletal Disorders Cases Associated With Work-Relatedness Of Semiconductor Workers Using Logistic Regression Model
by: Chai, Fong Ling
Published: (2020)
by: Chai, Fong Ling
Published: (2020)
Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt
by: Shaffiei, Zatul Alwani
Published: (2021)
by: Shaffiei, Zatul Alwani
Published: (2021)
The relationship between quality system factors, satisfaction, monetary cost and continuance intention to use M-health
by: Alblooshi, Halima Mohammed Murad Karam
Published: (2021)
by: Alblooshi, Halima Mohammed Murad Karam
Published: (2021)
Modified finite difference method using random sampling for nonlinear epidemic models / Maha Abduljabbar Mohammed
by: Maha Abduljabbar , Mohammed
Published: (2018)
by: Maha Abduljabbar , Mohammed
Published: (2018)
On some methods of feature engineering useful for craniodental morphometrics of rats, shrews and kangaroos / Aneesha Pillay Balachandran Pillay
by: Aneesha Pillay , Balachandran Pillay
Published: (2024)
by: Aneesha Pillay , Balachandran Pillay
Published: (2024)
Compression Molded Kenaf/Polypropylene (K/PP) Composite : Determination Of Impact Properties Using Design Of Experiment (DOE) Analysis
by: Loh, Xiao Hui
Published: (2017)
by: Loh, Xiao Hui
Published: (2017)
Duplicates detection approach within incomplete data sets using dynamic sorting key and hot deck compensation method
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)
Maritime transportation system, economy distribution and seaport network efficiency using fuzzy data envelopment analysis with clustering approach / Dineswary Nadarajan
by: Dineswary , Nadarajan
Published: (2023)
by: Dineswary , Nadarajan
Published: (2023)
Predictive modelling of student academic performance using machine learning approaches : a case study in universiti islam pahang sultan ahmad shah
by: Nurul Habibah, Abdul Rahman
Published: (2024)
by: Nurul Habibah, Abdul Rahman
Published: (2024)
Accurate identification of thirteen fly species from three families using wing venation patterns with machine learning approaches / Ling Min Hao
by: Ling Min Hao, Min Hao
Published: (2024)
by: Ling Min Hao, Min Hao
Published: (2024)
A study of the hyperbolic heat conduction problem and laplace inversion using generalized haar wavelet operational matrix method / Suazlan bin Mt Aznam
by: Mt Aznam, Suazlan
Published: (2012)
by: Mt Aznam, Suazlan
Published: (2012)
Similar Items
-
A Dynamic Approach using Indicators of Compromise to Detect Malicious Code
by: Ikenna Rene, Chiadighikaobi
Published: (2018) -
A completeness evaluation of patient records in medical tourism using completeness evaluation tool
by: Nor Rabbiatun, Mohamed Nazri
Published: (2014) -
A new one parameter family of Archimedean copula and its extensions / Azam Pirmoradian
by: Pirmoradian, Azam
Published: (2013) -
Android mobile malware detection model based on permission features using machine learning approach
by: Sharfah Ratibah, Tuan Mat
Published: (2022) -
Fuzzy analytical hierarchy process based risk assessment for malware detection in android mobile system
by: Juliza, Mohamad Arif
Published: (2022)