The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
Cryptojacking is a subset of cybercrime in which hackers use unauthorised devices (computers, smartphones, tablets, and even servers) to mine cryptocurrencies. Similar to many other forms of cybercrime, the objective of cryptojacking is achieve profit illegally. It is also designed to remain entirel...
| Main Authors: | Ahmad Firdaus, Zainal Abidin, Aldharhani, Ghassan Saleh, Zahian, Ismail, Mohd Faizal, Ab Razak |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/39105/ http://umpir.ump.edu.my/id/eprint/39105/1/The%20summer%20heat%20of%20cryptojacking%20season_Detecting%20cryptojacking.pdf http://umpir.ump.edu.my/id/eprint/39105/2/The%20summer%20heat%20of%20cryptojacking%20season_Detecting%20cryptojacking%20using%20heatmap%20and%20fuzzy_ABS.pdf |
Similar Items
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
by: Kong, Jun Hao
Published: (2023)
by: Kong, Jun Hao
Published: (2023)
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024)
by: Kadhum, Laith M., et al.
Published: (2024)
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
A Botnet Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
by: Ong, Wei Cheng
Published: (2023)
by: Ong, Wei Cheng
Published: (2023)
Android mobile malware detection using Fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Android mobile malware detection system using fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
Three layer authentications with a spiral block mapping to prove authenticity in medical images
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Evaluation of boruta algorithm in DDoS detection
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
Comparative analysis of machine learning classifiers for phishing detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
Monotone Fuzzy Rule Relabeling for the Zero-Order TSK Fuzzy Inference System
by: Tay, Kai Meng, et al.
Published: (2016)
by: Tay, Kai Meng, et al.
Published: (2016)
Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA)
by: Alamri, Hammoudeh S., et al.
Published: (2019)
by: Alamri, Hammoudeh S., et al.
Published: (2019)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Neuro-Fuzzy Approximation of Multi-Criteria Decision-Making
QFD Methodology
by: Vasant, Pandian
Published: (2008)
by: Vasant, Pandian
Published: (2008)
Fuzzy rules reduction using rough set approach
by: Yusof, Norazah, et al.
Published: (2003)
by: Yusof, Norazah, et al.
Published: (2003)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
Forecasting of Electricity Demand in Malaysia with Seasonal Highly Volatile Characteristics using SARIMA – GARCH Model
by: Syarranur, Zaim, et al.
Published: (2023)
by: Syarranur, Zaim, et al.
Published: (2023)
Fuzzy adaptive teaching learning-based optimization for solving unconstrained numerical optimization problems
by: Din, Fakhrud, et al.
Published: (2022)
by: Din, Fakhrud, et al.
Published: (2022)
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2023)
by: Noor Syahirah, Nordin, et al.
Published: (2023)
Implementing the reliability of data information in multi-criteria decision making process based on fuzzy topsis and fuzzy entropy
by: N. J., Mohd Jamal, et al.
Published: (2021)
by: N. J., Mohd Jamal, et al.
Published: (2021)
Real-time fault diagnostic in rotating shaft using IoT-based architecture and fuzzy logic analysis
by: Nur Afiqah, Mohd Azman, et al.
Published: (2023)
by: Nur Afiqah, Mohd Azman, et al.
Published: (2023)
Deep learning based hybrid analysis of malware detection and classification: A recent review
by: Hussain, Syed Shuja, et al.
Published: (2023)
by: Hussain, Syed Shuja, et al.
Published: (2023)
A note on “The nearest symmetric fuzzy
solution for a symmetric fuzzy linear system”
by: Malkawi, Ghassan, et al.
Published: (2015)
by: Malkawi, Ghassan, et al.
Published: (2015)
Prediction of zoonosis incidence in human using seasonal auto regressive integrated moving average (SARIMA).
by: Adhistya, Erna, et al.
Published: (2009)
by: Adhistya, Erna, et al.
Published: (2009)
Fuzzy splicing systems
by: Karimi, Fariba, et al.
Published: (2014)
by: Karimi, Fariba, et al.
Published: (2014)
Fuzzy skin detection
by: Tey, Yi Chin
Published: (2008)
by: Tey, Yi Chin
Published: (2008)
Comparison between fuzzy and NN method for speech emotion recognition
by: Razak,, AA, et al.
Published: (2005)
by: Razak,, AA, et al.
Published: (2005)
Understanding COVID-19 halal vaccination discourse on facebook and twitter using aspect-based sentiment analysis and text emotion analysis
by: Feizollah, Ali, et al.
Published: (2022)
by: Feizollah, Ali, et al.
Published: (2022)
Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean
by: Lorpunmanee, Siriluck, et al.
Published: (2007)
by: Lorpunmanee, Siriluck, et al.
Published: (2007)
Characterizations of fuzzy fated filters of
R0-algebras based on fuzzy points
by: Kavikumar, J., et al.
Published: (2017)
by: Kavikumar, J., et al.
Published: (2017)
Mobile malware anomaly-based detection systems using static analysis features / Ahmad Firdaus Zainal Abidin
by: Ahmad Firdaus, Zainal Abidin
Published: (2017)
by: Ahmad Firdaus, Zainal Abidin
Published: (2017)
Systematic description of the internet of things: A bibliometric analysis
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
Row reduced echelon Form for solving fully fuzzy system with unknown coefficients
by: Malkawi, Ghassan, et al.
Published: (2014)
by: Malkawi, Ghassan, et al.
Published: (2014)
Fuzzy Optimization via Multi-Objective Evolutionary Computation for Chocolate Manufacturing
by: Vasant, Pandian
Published: (2008)
by: Vasant, Pandian
Published: (2008)
The rise of ransomware: a review of attacks, detection techniques, and future challenges
by: Kamil, Samar, et al.
Published: (2022)
by: Kamil, Samar, et al.
Published: (2022)
Applying Fuzziness in Neural Symbolic-Integration
by: Farah Liyana, Azizan, et al.
Published: (2012)
by: Farah Liyana, Azizan, et al.
Published: (2012)
Scientific visualization of BioHeat process/ Rosnani Ramin
by: Rosnani, Ramen
Published: (2005)
by: Rosnani, Ramen
Published: (2005)
Fuzzy !-automata and its relationships
by: Cokilavany, R., et al.
Published: (2015)
by: Cokilavany, R., et al.
Published: (2015)
Fuzzy modeling using Bat Algorithm optimization for classification
by: Noor Amidah, Ahmad Sultan
Published: (2018)
by: Noor Amidah, Ahmad Sultan
Published: (2018)
Similar Items
-
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
by: Kong, Jun Hao
Published: (2023) -
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024) -
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
by: Nur Khairani, Kamarudin, et al.
Published: (2023) -
A Botnet Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
by: Ong, Wei Cheng
Published: (2023) -
Android mobile malware detection using Fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)