Reported malicious codes incident within Malaysia’s landscape: Time series modelling and a timeline analysis
The advancement of technology is such a marvel in these modern days. As countries embrace the vast progress of cyber-technology, the risk of cyber threats increases. Malicious codes have been one of the most menacing threats in the cyberspace. This research aims to investigate the outliers in the da...
| Main Authors: | Md Azam, Muhammad Nadzmi, Ramli, Nor Azuana |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
AMCS Research Centre
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/37492/ http://umpir.ump.edu.my/id/eprint/37492/1/IPC%202022%20-%20FULL%20PAPER%20TEMPLATE%20nadzmi.pdf |
Similar Items
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)
by: Ong, Vienna Lee
Published: (2019)
Time series forecasting for tourism industry in Malaysia
by: Noratikah, Abu, et al.
Published: (2024)
by: Noratikah, Abu, et al.
Published: (2024)
Modeling malicious multi-attacker node collusion
in MANETs via game theory
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
Analysis of Malaysia’s future talents using time series
by: Farhan Arshad, Mohamad Rai’zuddin, et al.
Published: (2022)
by: Farhan Arshad, Mohamad Rai’zuddin, et al.
Published: (2022)
Filtration Model for the Detection of Malicious Traffic in Large-Scale Networks
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
Neural network in corner detection of vertex chain code series
by: Subri, S. H., et al.
Published: (2006)
by: Subri, S. H., et al.
Published: (2006)
A survey on current malicious javascript behavior of infected web content in detection of malicious web pages
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
Analysis of time series by re-sampling
by: Mohamed, B. I., et al.
Published: (2012)
by: Mohamed, B. I., et al.
Published: (2012)
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013)
by: Wei, Xianglin, et al.
Published: (2013)
Web Based Malicious URL Detection Through Feature Selection (Special Characters) with Machine Learning
by: Anwar Razlan, Rasali
Published: (2023)
by: Anwar Razlan, Rasali
Published: (2023)
Recurrence Analysis of Time Series
by: Chew, Kai Ye
Published: (2019)
by: Chew, Kai Ye
Published: (2019)
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005)
by: Yap, , TS, et al.
Published: (2005)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
Visual study of timeline and collaborative events of ion trajectories in glass structure
by: Mohamad Sharif, Johan, et al.
Published: (2007)
by: Mohamad Sharif, Johan, et al.
Published: (2007)
Application Of The Blockchain Technology Within Healthcare
by: Lin, Michelle Hwei Yee
Published: (2021)
by: Lin, Michelle Hwei Yee
Published: (2021)
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012)
by: Wei, Xianglin, et al.
Published: (2012)
An artificial co-stimulation classifier for malicious API calls classification in portable executable malwares / Saman Mirza Abdulla
by: Abdulla, Saman Mirza
Published: (2012)
by: Abdulla, Saman Mirza
Published: (2012)
A Review on Predictive Model for Heart Disease using Wearable Devices Datasets
by: Mohd Syafiq Asyraf, Suhaimi, et al.
Published: (2024)
by: Mohd Syafiq Asyraf, Suhaimi, et al.
Published: (2024)
An investigation into the recurring patterns of forex
time series data
by: Yong, Yoke Leng *, et al.
Published: (2015)
by: Yong, Yoke Leng *, et al.
Published: (2015)
A malicious URLs detection system using optimization and machine learning classifiers
by: Lee, Ong Vienna, et al.
Published: (2020)
by: Lee, Ong Vienna, et al.
Published: (2020)
Decoding the future of human resource: How human resource analytics revolutionise the organisational landscape
by: Ahmad Hafizi, Ahmad Giran, et al.
Published: (2024)
by: Ahmad Hafizi, Ahmad Giran, et al.
Published: (2024)
GARCH models and distributions comparison for nonlinear time series with volatilities
by: Nur Haizum, Abd Rahman, et al.
Published: (2023)
by: Nur Haizum, Abd Rahman, et al.
Published: (2023)
Activation functions performance in multilayer perceptron for time series forecasting
by: Nur Haizum, Abd Rahman, et al.
Published: (2024)
by: Nur Haizum, Abd Rahman, et al.
Published: (2024)
Hyperparameter tuning of deep neural network in time series forecasting
by: Xiang, Kelly Pang Li, et al.
Published: (2024)
by: Xiang, Kelly Pang Li, et al.
Published: (2024)
Predicting Bitcoin and Ethereum prices using long short-term memory and gated recurrent unit
by: Mohd Haziq, Abdul Hadi, et al.
Published: (2023)
by: Mohd Haziq, Abdul Hadi, et al.
Published: (2023)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Code generation for embedded real time system
by: Talab, Mahmood Aghajani Siroos
Published: (2010)
by: Talab, Mahmood Aghajani Siroos
Published: (2010)
COMPARATIVE ANALYSIS ON TIME SERIES WITH INCLUDED STRUCTURAL BREAK
by: Vasant, Pandian
Published: (2009)
by: Vasant, Pandian
Published: (2009)
Integration of GWO-LSSVM for time series predictive analysis
by: Zuriani, Mustaffa, et al.
Published: (2016)
by: Zuriani, Mustaffa, et al.
Published: (2016)
MSG467 - Time Series Analysis
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2022)
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2022)
MSG467 - Time Series Analysis
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2024)
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2024)
MSG467 - Time Series Analysis
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2024)
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2024)
Rest API Implementation on Presence System using QR-Code and Web-Based
Haversine Formula Method
by: Yiyi, Supendi, et al.
Published: (2023)
by: Yiyi, Supendi, et al.
Published: (2023)
Real-time personal protective equipment compliance detection using you only look once
by: Nurhanisah, Aminuddin, et al.
Published: (2024)
by: Nurhanisah, Aminuddin, et al.
Published: (2024)
Preprocessing And Clustering Short Time-Series Microarray
by: Loh, Wei Ping
Published: (2008)
by: Loh, Wei Ping
Published: (2008)
Similar Items
-
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012) -
Malicious website detection
by: Ong, Vienna Lee
Published: (2019) -
Time series forecasting for tourism industry in Malaysia
by: Noratikah, Abu, et al.
Published: (2024) -
Modeling malicious multi-attacker node collusion
in MANETs via game theory
by: Khan, Burhan Ul Islam, et al.
Published: (2017) -
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)