An artificial co-stimulation classifier for malicious API calls classification in portable executable malwares / Saman Mirza Abdulla
Recently, most researchers have employed behaviour based detection systems to classify Portable Executable (PE) malwares. They usually tried to identify malicious Application Programming Interface (API) calls among the sequence of calls that made by a suspected application. They depended mostly on m...
| Main Author: | Abdulla, Saman Mirza |
|---|---|
| Format: | Thesis |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/5536/ http://studentsrepo.um.edu.my/5536/1/AN_ARTIFICIAL_CO%2DSTIMULATION_CLASSIFIER_FOR_MALICIOUS_API_CALLS_CLASSIFICATION_IN_PORTABLE_EXECUTABLE_MALWARES.pdf |
Similar Items
Garment Dryer / Mirza Khairina Shaharuddin
by: Shaharuddin, Mirza Khairina
Published: (2020)
by: Shaharuddin, Mirza Khairina
Published: (2020)
Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
Defending Malicious Script Attacks Using Machine
Learning Classifiers
by: Nayeem, Khan, et al.
Published: (2017)
by: Nayeem, Khan, et al.
Published: (2017)
Molecular characterization of multidrug resistant pseudomonas aeruginosa / Abdelkodose Mohammed Hussen Abdulla
by: Hussen Abdulla, Abdelkodose Mohammed
Published: (2012)
by: Hussen Abdulla, Abdelkodose Mohammed
Published: (2012)
Behavioural correlation for malicious bot detection
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
A malicious URLs detection system using optimization and machine learning classifiers
by: Lee, Ong Vienna, et al.
Published: (2020)
by: Lee, Ong Vienna, et al.
Published: (2020)
Facilities audit for “surau” building in housing estates / Mirza Fariza Narawi
by: Narawi, Mirza Fariza
Published: (2008)
by: Narawi, Mirza Fariza
Published: (2008)
Effects of heat transfer in jig molds in injection casting / Hussam Abdulla Moussa Mouhanna
by: Hussam Abdulla Moussa, Mouhanna
Published: (2019)
by: Hussam Abdulla Moussa, Mouhanna
Published: (2019)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Electricity demand prediction using a hybrid approach / Syamnd Mirza Abdullah
by: Syamnd Mirza, Abdullah
Published: (2017)
by: Syamnd Mirza, Abdullah
Published: (2017)
Singapore one : perancangan, implimentasi dan kejayaannya / Emma Mirza Wati Mohamad.
by: Mohamad, Emma Mirza Wati
Published: (2004)
by: Mohamad, Emma Mirza Wati
Published: (2004)
Mirza joined TDC in the 80s
Published: (2009)
Published: (2009)
The influence of geography on Yemen's Red Sea geopolitics and the Houthi maritime insurgency / Khaldoon Ahmed Hasson Abdulla
by: Khaldoon Ahmed , Hasson Abdulla
Published: (2019)
by: Khaldoon Ahmed , Hasson Abdulla
Published: (2019)
Challenges faced by international postgraduate students at an institution of higher learning: a case study / Ibtesam Abdulla Baroni
by: Abdulla Baroni, Ibtesam
Published: (2011)
by: Abdulla Baroni, Ibtesam
Published: (2011)
A study to determine the location and morphology of incisive canal and foramen / Samah Mohammed Abdulla Al-Amery
by: Al-Amery, Samah Mohammed Abdulla
Published: (2011)
by: Al-Amery, Samah Mohammed Abdulla
Published: (2011)
Service quality framework for mobile government services in Kingdom of Bahrain / Abdulla Jaafar Mohamed Hasan Ali
by: Abdulla Jaafar Mohamed , Hasan Ali
Published: (2022)
by: Abdulla Jaafar Mohamed , Hasan Ali
Published: (2022)
Architectural design keywords of inception space / Muhammad Heru Arie Edytia, Zulhadi Sahputra and Mirza
by: Muhammad Heru, Arie Edytia, et al.
Published: (2019)
by: Muhammad Heru, Arie Edytia, et al.
Published: (2019)
Anatomical course, variations and radiological evaluation of injury to cadaveric lingual nerve / Samah Mohammed Abdulla al-Amery
by: Samah Mohammed, Abdulla al-Amery
Published: (2017)
by: Samah Mohammed, Abdulla al-Amery
Published: (2017)
Strength and characteristic of composite modelled of kaolinite clay and crushed siltstone as landfill liner / Nursyazreen Ahmad Mirza
by: Ahmad Mirza, Nursyazreen
Published: (2014)
by: Ahmad Mirza, Nursyazreen
Published: (2014)
Managing talents through succession planning in the Malaysian public sector / Hamizam Abdulla Zabidi...[et al.]
by: Abdulla Zabidi, Hamizam, et al.
Published: (2010)
by: Abdulla Zabidi, Hamizam, et al.
Published: (2010)
Development of nanofluid based horizontal heat storage unit / Saman Paria
by: Saman , Paria
Published: (2016)
by: Saman , Paria
Published: (2016)
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)
by: Ong, Vienna Lee
Published: (2019)
A Secure Portable execution Environment to Support Teleworking
by: James, P., et al.
Published: (2014)
by: James, P., et al.
Published: (2014)
Governmental accounting innovation in Yemen : the introduction of accruals accounting & the moderating role of e-government / Abdulla Mohamed Hamoud Al-Tholaya
by: Al-Tholaya, Abdulla Mohamed Hamoud
Published: (2013)
by: Al-Tholaya, Abdulla Mohamed Hamoud
Published: (2013)
Preparation and characterization of alkyd coating with self-healing ability / Nornadila Mohd Saman
by: Nornadila , Mohd Saman
Published: (2019)
by: Nornadila , Mohd Saman
Published: (2019)
Development of a scaffold incorporating zinc-oxide nano-particles for cartilage tissue engineering under physiological conditions / Eraj Humayun Mirza
by: Eraj Humayun, Mirza
Published: (2016)
by: Eraj Humayun, Mirza
Published: (2016)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
A survey on current malicious javascript behavior of infected web content in detection of malicious web pages
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
Malicious software prevention for Muslim communities
by: Ahmad Zabidi, Muhammad Najmi
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi
Published: (2012)
Gapena teruskan niat saman
by: Berita Harian, Rashiqah Ilmi Abd Rahim
Published: (2009)
by: Berita Harian, Rashiqah Ilmi Abd Rahim
Published: (2009)
RAPID-risk assessment of android permission and application programming interface (API) call for android botnet
by: Abdullah, Zubaile, et al.
Published: (2018)
by: Abdullah, Zubaile, et al.
Published: (2018)
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
Pandangan pengguna terhadap barangan Amway di kawasan Petaling Jaya / Din Ahmad Mat Saman
by: Mat Saman, Din Ahmad
Published: (1980)
by: Mat Saman, Din Ahmad
Published: (1980)
Foreign customer satisfaction level towards KFC Holdings (Malaysia) Berhad / Nor Atikah Kamarun Saman
by: Kamarun Saman, Nor Atikah
Published: (2011)
by: Kamarun Saman, Nor Atikah
Published: (2011)
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
Implementing severity factor to mitigate malicious insider
by: Asmawi, Aziah, et al.
Published: (2019)
by: Asmawi, Aziah, et al.
Published: (2019)
Flood adaptive settlements towards urban development in the Riparian of Meureudu River, Aceh Province, Indonesia / Mirza Irwansyah, Cut Nursaniah and Laila Qadri
by: Irwansyah, Mirza, et al.
Published: (2019)
by: Irwansyah, Mirza, et al.
Published: (2019)
Challenging tradition: the Indonesian novel Saman
by: Rochayah Machali,, et al.
Published: (2005)
by: Rochayah Machali,, et al.
Published: (2005)
Similar Items
-
Garment Dryer / Mirza Khairina Shaharuddin
by: Shaharuddin, Mirza Khairina
Published: (2020) -
Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018) -
Defending Malicious Script Attacks Using Machine
Learning Classifiers
by: Nayeem, Khan, et al.
Published: (2017) -
Molecular characterization of multidrug resistant pseudomonas aeruginosa / Abdelkodose Mohammed Hussen Abdulla
by: Hussen Abdulla, Abdelkodose Mohammed
Published: (2012) -
Behavioural correlation for malicious bot detection
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)