A framework for malware identification based on behavior
Malware is one of the major security threats in a computer and network environment. Modem malware embeds several techniques in order to complicate malware defence. The current malware issues such as zero-day attacks, malware avoidance techniques and hybrid malware are highlighted. Furthermore, a com...
| Main Author: | Mohamad Fadli, Zolkipli |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/13456/ http://umpir.ump.edu.my/id/eprint/13456/1/MOHAMAD%20FADLI%20ZOLKIPLI.pdf |
Similar Items
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Maldroid- attribute selection analysis for malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Malware classification based on target location
by: Nasuha, Noor Baha
Published: (2014)
by: Nasuha, Noor Baha
Published: (2014)
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014)
by: Zolkipli, Mohamad Fadli
Published: (2014)
A static analysis approach for android permission-based malware detection systems
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
A review : Static analysis of android malware and detection technique
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Deep learning based hybrid analysis of malware detection and classification: A recent review
by: Hussain, Syed Shuja, et al.
Published: (2023)
by: Hussain, Syed Shuja, et al.
Published: (2023)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Next generation security operation center framework
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017)
by: Ali, Feizollah
Published: (2017)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Malware detection system using cloud sandbox, machine learning
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
Malware detection using n-gram with TF-IDF weighting
by: Natasha, Zainal
Published: (2018)
by: Natasha, Zainal
Published: (2018)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014)
by: Damshenas, Mohsen
Published: (2014)
Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics
by: Ahmad, Firdaus, et al.
Published: (2017)
by: Ahmad, Firdaus, et al.
Published: (2017)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
Malware detection using static analysis in android: A review of FeCO (features, classification, and obfuscation)
by: Rosmalissa, Jusoh, et al.
Published: (2021)
by: Rosmalissa, Jusoh, et al.
Published: (2021)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Android mobile malware detection using Fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
An integrated software quality model in a fuzzy analytical hierarchy process-based evaluation framework for e-learning software / Ahmad Fadli Saad
by: Ahmad Fadli , Saad
Published: (2017)
by: Ahmad Fadli , Saad
Published: (2017)
Design a Technique for Minimizing Unnecessary Handoff
in Mobile Wireless Networks
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practices
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
A Survey on Balancing Data Loss Prevention (DLP) with User Privacy in a
Data-Driven World
by: Nurhafizah, Ahmad Zaini, et al.
Published: (2024)
by: Nurhafizah, Ahmad Zaini, et al.
Published: (2024)
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Cloud of Word vs DroidKungfu: Performance evaluation in detecting root exploit malware with deep learning approach
by: Che Akmal, Che Yahaya, et al.
Published: (2023)
by: Che Akmal, Che Yahaya, et al.
Published: (2023)
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
by: Mazlan, Nurul Hidayah
Published: (2019)
by: Mazlan, Nurul Hidayah
Published: (2019)
Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks
by: Mohammed Hasan, Ali, et al.
Published: (2015)
by: Mohammed Hasan, Ali, et al.
Published: (2015)
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018)
by: A. Ahmed, Hussam, et al.
Published: (2018)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
Android mobile malware detection system using fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Permission extraction framework for android malware detection
by: Ghasempour, Ali
Published: (2019)
by: Ghasempour, Ali
Published: (2019)
Auto–transition in RADG based on chaotic system
by: Kadhum, Laith M., et al.
Published: (2023)
by: Kadhum, Laith M., et al.
Published: (2023)
Similar Items
-
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018) -
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021) -
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018) -
Maldroid- attribute selection analysis for malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2019) -
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)