Ensemble based categorization and adaptive model for malware detection
Malware, a term which was derived from two words; malicious software has caused many problem to the computer users throughout the world. Previously was known as many names; trojan, virus, worms, dialers and many others, thid potientially unwanted software simply labeled as malware. Malware is a...
| Main Authors: | Ahmad Zabidi, Muhammad Najmi, Maarof, Mohd Aizaini, Zainal, Anazida |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/15860/ http://irep.iium.edu.my/15860/1/Ensemble_Based_Categorization_and_Adaptive_Model_for_Malware_Detection.pdf |
Similar Items
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Challenges in high accuracy of malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019)
by: Mohammad Salehi, .
Published: (2019)
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Solving time gap problems through the optimization of detecting stepping stone algorithm
by: Omar, Mohd. Nizam, et al.
Published: (2004)
by: Omar, Mohd. Nizam, et al.
Published: (2004)
Machine Learning Malware Detection For Android
by: Amir Muhammad Hafiz, Othman
Published: (2022)
by: Amir Muhammad Hafiz, Othman
Published: (2022)
A Bayesian probability model for Android malware detection
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
Malware Detection In Android Using Machine Learning
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
The optimization of stepping stone detection: Packet capturing steps
by: Omar, Mohd Nizam, et al.
Published: (2006)
by: Omar, Mohd Nizam, et al.
Published: (2006)
Applying Bayesian probability for Android malware detection using permission features
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
Bio-inspired for Features Optimization and Malware Detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
Android mobile malware detection using Fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Finding granular features using rough-PSO in IDS
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024)
by: Kadhum, Laith M., et al.
Published: (2024)
Automated feature selection using boruta algorithm to detect mobile malware
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
Mobile malware anomaly-based detection systems using static analysis features / Ahmad Firdaus Zainal Abidin
by: Ahmad Firdaus, Zainal Abidin
Published: (2017)
by: Ahmad Firdaus, Zainal Abidin
Published: (2017)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Android mobile malware detection model based on permission features using machine learning approach
by: Sharfah Ratibah, Tuan Mat
Published: (2022)
by: Sharfah Ratibah, Tuan Mat
Published: (2022)
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Malware detection using n-gram with TF-IDF weighting
by: Natasha, Zainal
Published: (2018)
by: Natasha, Zainal
Published: (2018)
Modeling 2D appearance evolution for 3D object
categorization
by: Mohd Zaki, Hasan Firdaus, et al.
Published: (2016)
by: Mohd Zaki, Hasan Firdaus, et al.
Published: (2016)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
An Improved Genetic Clustering Algorithm for Categorical Data
by: Jasni, Mohamad Zain, et al.
Published: (2013)
by: Jasni, Mohamad Zain, et al.
Published: (2013)
Fuzzy analytical hierarchy process based risk assessment for malware detection in android mobile system
by: Juliza, Mohamad Arif
Published: (2022)
by: Juliza, Mohamad Arif
Published: (2022)
A malware risk analysis and detection system for mobile devices using permission-based features / Mohd Faizal Ab Razak
by: Mohd Faizal , Ab Razak
Published: (2018)
by: Mohd Faizal , Ab Razak
Published: (2018)
Email categorization using support vector machine
by: Mohd. Daud, Mariah
Published: (2004)
by: Mohd. Daud, Mariah
Published: (2004)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
A static analysis approach for android permission-based malware detection systems
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Similar Items
-
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012) -
Challenges in high accuracy of malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012) -
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006) -
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005) -
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019)