An improved malware detection framework
The detection of malware intrusion requires the identification of its signature. However, cyber security practitioners are having difficulty to manually detect signature-based malware due to the increasing number of malware. As a consequence, malware are only detected after an incident has occurred....
| Auteur principal: | Aswami Fadillah, Ahmad Naim Irfan |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2020
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/108009/1/AhmadNaimIrfanAswamiFadillahMFTIR2020.pdf.pdf |
Documents similaires
A study of generation Y attitude towards usage of internet for e-commerce in MSC landmark, Kuala Lumpur & Selangor state
par: Luthfi, Harvi Muhammad
Publié: (2014)
par: Luthfi, Harvi Muhammad
Publié: (2014)
Backdoor attack detection based on stepping stone detection approach
par: Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Publié: (2014)
par: Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Publié: (2014)
A Framework to Support IT Outsourcing Process Decision
par: Yap, Chee Cheng
Publié: (2004)
par: Yap, Chee Cheng
Publié: (2004)
A framework for health information adoption in Thailand
par: Meeplat, Nopparat
Publié: (2018)
par: Meeplat, Nopparat
Publié: (2018)
A Framework for Ethical Usage of ICT Services at Cyber Cafe Using Theory of Planned Behavior
par: Zuriani, Ahmad Zukarnain
Publié: (2011)
par: Zuriani, Ahmad Zukarnain
Publié: (2011)
Framework for Adoption of Customer Relationship Management System in Hospital
par: Rababah, Khalid Ali Mohammad
Publié: (2012)
par: Rababah, Khalid Ali Mohammad
Publié: (2012)
Distributed denial of service detection using stepping stone detection method in internet control message protocol attack
par: Nor Izham, Subri
Publié: (2017)
par: Nor Izham, Subri
Publié: (2017)
An enhanced architecture of online 3D visualization framework for monitoring coconut plantation
par: Saha, Gonesh Chandra
Publié: (2020)
par: Saha, Gonesh Chandra
Publié: (2020)
A Framework to Study Factors Influencing the Acceptance of Information Technology in Yemen Government
par: Al Haderi, Sami Mohammed Saleh
Publié: (2012)
par: Al Haderi, Sami Mohammed Saleh
Publié: (2012)
Hybrid features for detection of malicious user in YouTube
par: Sadoon, Omar Hadeb
Publié: (2017)
par: Sadoon, Omar Hadeb
Publié: (2017)
Development of an information and communication technology works interface framework for large scale construction-based project
par: Mohd Azahani, Md Taib
Publié: (2018)
par: Mohd Azahani, Md Taib
Publié: (2018)
A Proposed Framework for Analyzing Performance of Routing Protocols in Wireless Sensor Network Using a Network Simulator
par: Mustafa, Hashmi
Publié: (2004)
par: Mustafa, Hashmi
Publié: (2004)
Improved watermarking scheme based on best color channel selection using discrete slantlet transform
par: Adnan, Myasar Mundher
Publié: (2013)
par: Adnan, Myasar Mundher
Publié: (2013)
Policy guidelines to improve data governance in university college of Agroscience Malaysia : a case study
par: A. Wahid, Rohayu
Publié: (2016)
par: A. Wahid, Rohayu
Publié: (2016)
Kajian Terhadap Proses Penjanaan Pengetahuan Dalam Kaedah - Kaedah Pengajaran Ekspositori Dan Pembelajaran Berasaskan Masalah Berbantukan Sistem Pengurusan Pembelajaran
par: Ahmad, Mazida
Publié: (2010)
par: Ahmad, Mazida
Publié: (2010)
Web Based On-Line Analytical Processing (WOLAP) Model
par: Amran, Ahmad
Publié: (2002)
par: Amran, Ahmad
Publié: (2002)
Goal oriented software sustainability evaluation model for sustainable software development
par: Ruzita, Ahmad
Publié: (2019)
par: Ruzita, Ahmad
Publié: (2019)
The relationship between innovation and information technology on organizational performance
par: Noor Azinuddin, Ahmad
Publié: (2015)
par: Noor Azinuddin, Ahmad
Publié: (2015)
Decision support system for building information modeling (BIM) software selection: A case study in construction feasibility stage
par: Ahmad Taufik, Nursal
Publié: (2015)
par: Ahmad Taufik, Nursal
Publié: (2015)
The Development Of A Postgraduate Management System (PG-MS)
par: Nusir, Muneer Saeed Ahmad
Publié: (2008)
par: Nusir, Muneer Saeed Ahmad
Publié: (2008)
An automatic diacritization algorithm for undiacritized Arabic text
par: Zayyan, Ayman Ahmad Muhammad
Publié: (2017)
par: Zayyan, Ayman Ahmad Muhammad
Publié: (2017)
Examination of interest of things adoption among aquaculturist in Malaysia
par: Ahmad Khalid, Md. Khairi
Publié: (2018)
par: Ahmad Khalid, Md. Khairi
Publié: (2018)
Application of Islamic advertising among muslim online seller
par: Muhammad Hawez Qarni, Ahmad
Publié: (2023)
par: Muhammad Hawez Qarni, Ahmad
Publié: (2023)
An adaptive social-aware device-to-device communication mechanism for wireless networks
par: Alden, Feras Zen
Publié: (2020)
par: Alden, Feras Zen
Publié: (2020)
Evaluating customers’ acceptance on electronic
payment system in Algeria
par: Alaeddine, Ziouache
Publié: (2020)
par: Alaeddine, Ziouache
Publié: (2020)
Producer mobility support scheme for indirection-based mobility approach in named data networking
par: Hussaini, Muktar
Publié: (2020)
par: Hussaini, Muktar
Publié: (2020)
Data redundancy reduction scheme for data aggregation in wireless sensor network
par: Adawy, Mohammad Ibrahim
Publié: (2020)
par: Adawy, Mohammad Ibrahim
Publié: (2020)
Teknik penyembunyian mesej dalam steganografi teks menggunakan pendekatan warna RGB dan penempatan rawak
par: Baharudin, Osman
Publié: (2020)
par: Baharudin, Osman
Publié: (2020)
Factors affecting information technology (IT) competency among auditors in Kedah
par: PUTRI AMIRAH, MEGAT AZAMUDDIN
Publié: (2020)
par: PUTRI AMIRAH, MEGAT AZAMUDDIN
Publié: (2020)
E-filing users’ satisfaction: A study on Malaysia petroleum upstream taxpayers
par: Jaimin, Hairul Salveson
Publié: (2020)
par: Jaimin, Hairul Salveson
Publié: (2020)
Antecedent factors of knowledge sharing in research
par: Khosravi, Arash
Publié: (2013)
par: Khosravi, Arash
Publié: (2013)
Indoor multiband antenna for wireless mobile broadband communication
par: Fadoul, Moubachir Madani
Publié: (2013)
par: Fadoul, Moubachir Madani
Publié: (2013)
Information security management metrics in web application
par: Abd. Rahim, Mohd. Hafiz
Publié: (2013)
par: Abd. Rahim, Mohd. Hafiz
Publié: (2013)
The readiness of Malaysia medium - sized enterprises in manufacturing sector to adopt information communication technology
par: Ng, Boon Beng
Publié: (2007)
par: Ng, Boon Beng
Publié: (2007)
Knowledge center model by incorporating knowledge center features in sharepoint for Malaysian Nuclear Agency
par: Hassannuddin, Ily Amirah
Publié: (2014)
par: Hassannuddin, Ily Amirah
Publié: (2014)
Capacity report automation for capacity planning
par: Santhanasamy, Rebecca
Publié: (2017)
par: Santhanasamy, Rebecca
Publié: (2017)
Success model for BYOD implementation considering human and security perspectives in Malaysia government environment
par: Mat Akhir, Haslinda
Publié: (2017)
par: Mat Akhir, Haslinda
Publié: (2017)
Characterization of thulium-doped fiber as active gain medium at 2000 nanometer wavelength region
par: Mohd. Sharif, Nurhanis
Publié: (2017)
par: Mohd. Sharif, Nurhanis
Publié: (2017)
Exploiting 2-dimensional source correlation in channel decoding with parameter estimation for unknown source
par: Mohd. Nor, Muhammad Izzat Amir
Publié: (2018)
par: Mohd. Nor, Muhammad Izzat Amir
Publié: (2018)
Design and optimization of heat exchanger network in olefin unit of oil refinery
par: Sharifi, Foad
Publié: (2015)
par: Sharifi, Foad
Publié: (2015)
Documents similaires
-
A study of generation Y attitude towards usage of internet for e-commerce in MSC landmark, Kuala Lumpur & Selangor state
par: Luthfi, Harvi Muhammad
Publié: (2014) -
Backdoor attack detection based on stepping stone detection approach
par: Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Publié: (2014) -
A Framework to Support IT Outsourcing Process Decision
par: Yap, Chee Cheng
Publié: (2004) -
A framework for health information adoption in Thailand
par: Meeplat, Nopparat
Publié: (2018) -
A Framework for Ethical Usage of ICT Services at Cyber Cafe Using Theory of Planned Behavior
par: Zuriani, Ahmad Zukarnain
Publié: (2011)