Characterizing Current Features of Malicious Threats on Websites
The advance growth of cybercrime in recent years especially in high critical networks becomes an urgent issue to the security authorities. They compromised computer system, targeting especially to government sector, ecommerce and banking networks rigorously and made it difficult to detect the perpet...
| Main Authors: | Wan Nurulsafawati, Wan Manan, Ahmed, Abdulghani Ali, M. N. M., Kahar |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
Springer
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/30781/ |
Similar Items
A survey on current malicious javascript behavior of infected web content in detection of malicious web pages
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)
by: Ong, Vienna Lee
Published: (2019)
Filtration Model for the Detection of Malicious Traffic in Large-Scale Networks
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
Web Based Malicious URL Detection Through Feature Selection (Special Characters) with Machine Learning
by: Anwar Razlan, Rasali
Published: (2023)
by: Anwar Razlan, Rasali
Published: (2023)
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013)
by: Wei, Xianglin, et al.
Published: (2013)
Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005)
by: Yap, , TS, et al.
Published: (2005)
Quality rating of Islamic websites features : a single-user evaluation
by: Md. Tap, Abu Osman, et al.
Published: (2010)
by: Md. Tap, Abu Osman, et al.
Published: (2010)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
Reported malicious codes incident within Malaysia’s landscape: Time series modelling and a timeline analysis
by: Md Azam, Muhammad Nadzmi, et al.
Published: (2022)
by: Md Azam, Muhammad Nadzmi, et al.
Published: (2022)
An artificial co-stimulation classifier for malicious API calls classification in portable executable malwares / Saman Mirza Abdulla
by: Abdulla, Saman Mirza
Published: (2012)
by: Abdulla, Saman Mirza
Published: (2012)
Modeling malicious multi-attacker node collusion
in MANETs via game theory
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012)
by: Wei, Xianglin, et al.
Published: (2012)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Phishing website detection
by: Nur Sholihah, Zaini
Published: (2018)
by: Nur Sholihah, Zaini
Published: (2018)
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
Android Botnets: A Serious Threat to Android Devices
by: Shahid, Anwar, et al.
Published: (2018)
by: Shahid, Anwar, et al.
Published: (2018)
A malicious URLs detection system using optimization and machine learning classifiers
by: Lee, Ong Vienna, et al.
Published: (2020)
by: Lee, Ong Vienna, et al.
Published: (2020)
Threat analysis using artificial neural network
by: Yee, Chan Pheng
Published: (2009)
by: Yee, Chan Pheng
Published: (2009)
Measuring Website Usability Construct as Second Order Construct in Website Usability Model
by: Nur Sukinah, Aziz, et al.
Published: (2018)
by: Nur Sukinah, Aziz, et al.
Published: (2018)
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
by: Ahmed, Abdulghani Ali
Published: (2019)
by: Ahmed, Abdulghani Ali
Published: (2019)
Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
Assessing Website Usability Attributes
by: Nur Sukinah, Aziz, et al.
Published: (2014)
by: Nur Sukinah, Aziz, et al.
Published: (2014)
Website accessibility performance evaluation in Malaysia
by: Jati, H., et al.
Published: (2008)
by: Jati, H., et al.
Published: (2008)
A survey on Islamic Websites for children
by: Kh. Abdulatif, Zaidoon, et al.
Published: (2011)
by: Kh. Abdulatif, Zaidoon, et al.
Published: (2011)
Verification of scholars and references in Islamic websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
Building trustworthy E-commerce website
by: Che Hussin, Ab. Razak
Published: (2007)
by: Che Hussin, Ab. Razak
Published: (2007)
The perception of Muslim users on reliability of Islamic
websites
by: Mohammad Nassr, Rasheed, et al.
Published: (2014)
by: Mohammad Nassr, Rasheed, et al.
Published: (2014)
A framework for heuristic evaluation on Islamic websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
User experience on educational websites’ search engine.
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
Machine learning technique for phishing website detection
by: Nurul Amira, Mohd Zin, et al.
by: Nurul Amira, Mohd Zin, et al.
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
Protect data and be alert to online cyber threats
by: Irman, Khalil, et al.
Published: (2021)
by: Irman, Khalil, et al.
Published: (2021)
Similar Items
-
A survey on current malicious javascript behavior of infected web content in detection of malicious web pages
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020) -
Malicious website detection
by: Ong, Vienna Lee
Published: (2019) -
Filtration Model for the Detection of Malicious Traffic in Large-Scale Networks
by: Ahmed, Abdulghani Ali, et al.
Published: (2015) -
Web Based Malicious URL Detection Through Feature Selection (Special Characters) with Machine Learning
by: Anwar Razlan, Rasali
Published: (2023) -
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)