Malware classification based on target location
The combination of Malicious and Software have contribute a phrase call as Malware. Malware are software that is intended to damage or disable computers and computer systems. Malware is software used to disrupt computer operation, gather sensitive information, or gain access to private computer syst...
| Main Author: | Nasuha, Noor Baha |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/13351/ http://umpir.ump.edu.my/id/eprint/13351/1/FSKKP%20-%20NASUHA%20NOOR%20BAHA.PDF |
Similar Items
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
Maldroid- attribute selection analysis for malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Deep learning based hybrid analysis of malware detection and classification: A recent review
by: Hussain, Syed Shuja, et al.
Published: (2023)
by: Hussain, Syed Shuja, et al.
Published: (2023)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012)
by: Mohamad Fadli, Zolkipli
Published: (2012)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Malware detection using static analysis in android: A review of FeCO (features, classification, and obfuscation)
by: Rosmalissa, Jusoh, et al.
Published: (2021)
by: Rosmalissa, Jusoh, et al.
Published: (2021)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
A static analysis approach for android permission-based malware detection systems
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
A review : Static analysis of android malware and detection technique
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Malware detection system using cloud sandbox, machine learning
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
Malware detection using n-gram with TF-IDF weighting
by: Natasha, Zainal
Published: (2018)
by: Natasha, Zainal
Published: (2018)
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017)
by: Ali, Feizollah
Published: (2017)
Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics
by: Ahmad, Firdaus, et al.
Published: (2017)
by: Ahmad, Firdaus, et al.
Published: (2017)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
Positioning simulator for location-based service
by: Devaraju, Anusuriya, et al.
Published: (2005)
by: Devaraju, Anusuriya, et al.
Published: (2005)
Cloud of Word vs DroidKungfu: Performance evaluation in detecting root exploit malware with deep learning approach
by: Che Akmal, Che Yahaya, et al.
Published: (2023)
by: Che Akmal, Che Yahaya, et al.
Published: (2023)
Building location-based service with Java technologies
by: Devaraju, Anusuriya, et al.
Published: (2005)
by: Devaraju, Anusuriya, et al.
Published: (2005)
Android mobile malware detection using Fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Secure student attendance system based on geo-location and QR code technologies
by: Noor Fathin Shahirah, Ahmat
Published: (2018)
by: Noor Fathin Shahirah, Ahmat
Published: (2018)
Enabling Mobile Location Based Services for Emergency Cases
by: Kamarudin, Noraziahtulhidayu, et al.
Published: (2011)
by: Kamarudin, Noraziahtulhidayu, et al.
Published: (2011)
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
by: Mazlan, Nurul Hidayah
Published: (2019)
by: Mazlan, Nurul Hidayah
Published: (2019)
Part time job locator
by: Kee, Soon Ching
Published: (2015)
by: Kee, Soon Ching
Published: (2015)
Review of hybrid analysis technique for malware detection
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
Cloud based public bus location tracking and notification application for mobile devices
by: Chee, Xian Yang
Published: (2019)
by: Chee, Xian Yang
Published: (2019)
Smart Location Alarm on Mobile Platform
by: Lai, Jia Yong
Published: (2020)
by: Lai, Jia Yong
Published: (2020)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Android mobile malware detection system using fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Blood Donor System Based On Location
by: Sarvess, Veeriyah
Published: (2023)
by: Sarvess, Veeriyah
Published: (2023)
Classification of key lime base on colour image processing
by: Rewathi, Karudan
Published: (2014)
by: Rewathi, Karudan
Published: (2014)
Android Mobile Application – Expenses with Geo-Location Tracking
by: Lee, Theng Hong
Published: (2015)
by: Lee, Theng Hong
Published: (2015)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
MODIFIED AIS-BASED CLASSIFIER FOR MUSIC GENRE
CLASSIFICATION
by: Muda, N. A.
Published: (2010)
by: Muda, N. A.
Published: (2010)
DNA Computing for Solving Distribution Center Location Problem
by: Hasudungan, Rofilde, et al.
Published: (2013)
by: Hasudungan, Rofilde, et al.
Published: (2013)
Locating and collecting cybercrime evidences on cloud storage: review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Investigation model for locating data remnants on cloud storage
by: Khalid, Abdulrahman, et al.
Published: (2019)
by: Khalid, Abdulrahman, et al.
Published: (2019)
Neural networks for web news classification based on augmented PCA
by: Selamat, Ali, et al.
Published: (2003)
by: Selamat, Ali, et al.
Published: (2003)
Behavior-based matchmaking system using player’s traits classification
by: Chin, Wing Hou
Published: (2018)
by: Chin, Wing Hou
Published: (2018)
Similar Items
-
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021) -
Maldroid- attribute selection analysis for malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2019) -
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016) -
Deep learning based hybrid analysis of malware detection and classification: A recent review
by: Hussain, Syed Shuja, et al.
Published: (2023) -
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)