On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus
Computer viruses and other forms of malware have viewed as a threat to any software system. They have the capability to deliver a malicious infection. A common technique that virus writers use to avoid detection is to enable the virus to change itself by having some kind of selfmodifying code. This...
| Main Authors: | Imran Edzereiq, Kamarudin, Syahrizal Azmir, Md Sharif, Tutut, Herawan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/6307/ http://umpir.ump.edu.my/id/eprint/6307/1/On_Analysis_and_Effectiveness_of_Signature_Based_in_Detecting_Metamorphic_Virus.pdf |
Similar Items
Performance Analysis on the Effect of G.729, Speex and GSM Speech Codec on 802.11g Wireless Local Area Network over VoIP using Packet Jitter
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
Classification of metamorphic virus using n-grams signatures
by: A Hamid, Isredza Rahmi, et al.
Published: (2020)
by: A Hamid, Isredza Rahmi, et al.
Published: (2020)
Detecting JFIF header using FORHEADER
by: Kamaruddin Malik, Mohamad, et al.
Published: (2011)
by: Kamaruddin Malik, Mohamad, et al.
Published: (2011)
BioHealthCloud: A Biometric Worldwide Public Cloud Infrastructure
by: M. A., Ameedeen, et al.
Published: (2014)
by: M. A., Ameedeen, et al.
Published: (2014)
Experimental Analysis on Available Bandwidth Estimation Tools for Wireless Mesh Network
by: Imran Edzereiq, Kamarudin, et al.
Published: (2015)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2015)
RMF: Rough Set Membership Function-based for Clustering Web Transactions
by: Herawan, Tutut, et al.
Published: (2013)
by: Herawan, Tutut, et al.
Published: (2013)
Evolutionary Grammars Based Design Framework For Product Innovation
by: Cheong Lee, Ho, et al.
Published: (2012)
by: Cheong Lee, Ho, et al.
Published: (2012)
CNAR-M: A model for mining critical negative association rules
by: Herawan, Tutut, et al.
Published: (2012)
by: Herawan, Tutut, et al.
Published: (2012)
Spiral bit-map signature for content-based images retrieval
by: Wang, Hui Hui
Published: (2003)
by: Wang, Hui Hui
Published: (2003)
Online signature verification discriminators
by: Omar, Nazaruddin, et al.
Published: (2006)
by: Omar, Nazaruddin, et al.
Published: (2006)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data
by: Hongwu, Qin, et al.
Published: (2014)
by: Hongwu, Qin, et al.
Published: (2014)
Approaches in creating meta-requirement: a systematic literature review
by: Muhamad Idaham, Umar Ong, et al.
Published: (2019)
by: Muhamad Idaham, Umar Ong, et al.
Published: (2019)
Multi-objective Functions in Grid Scheduling
by: Zafril Rizal, M Azmi, et al.
Published: (2015)
by: Zafril Rizal, M Azmi, et al.
Published: (2015)
A cloud architecture with an efficient scheduling technique
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Comparison of accuracy performance based on normalization techniques for the features fusion of face and online signature
by: Suryanti, Awang, et al.
Published: (2017)
by: Suryanti, Awang, et al.
Published: (2017)
Tracing Significant Association Rules Using Critical Least Association Rules Model
by: Zailani, Abdullah, et al.
Published: (2013)
by: Zailani, Abdullah, et al.
Published: (2013)
The Backbone of Key Successful Branding Strategies in the 21st Century: Innovation in Design Technology, Decision Making on Product Quality, and Collaborative Communications
by: Ho, Cheong Lee, et al.
Published: (2017)
by: Ho, Cheong Lee, et al.
Published: (2017)
Product Design Generation and Decision Making Through Strategic Integration of Evolutionary Grammars and Kano Model
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
A hardware-in-the-loop simulation and test for unmanned ground vehicle on indoor environment
by: Khalid, Yunus, et al.
Published: (2012)
by: Khalid, Yunus, et al.
Published: (2012)
Visualizing the construction of incremental Disorder Trie Itemset data structure (DOSTrieIT) for Frequent Pattern Tree (FP-Tree)
by: Zailani, Abdullah, et al.
Published: (2011)
by: Zailani, Abdullah, et al.
Published: (2011)
End-to-end delay performance for VoIP on LTE system in access network
by: Ng, Liang Shen, et al.
Published: (2013)
by: Ng, Liang Shen, et al.
Published: (2013)
MT2Way: A novel strategy for pair-wise test data generation
by: Rabbi, Khandakar Fazley, et al.
Published: (2012)
by: Rabbi, Khandakar Fazley, et al.
Published: (2012)
A novel normal parameter reduction algorithm of soft sets
by: Ma, Xiuqin, et al.
Published: (2010)
by: Ma, Xiuqin, et al.
Published: (2010)
Security enhancement of dynamic signature by utilizing local features with individual threshold
by: Suryanti, Awang, et al.
Published: (2018)
by: Suryanti, Awang, et al.
Published: (2018)
Mining Least Association Rules of Degree Level Programs Selected by Students
by: Zailani, Abdullah, et al.
Published: (2014)
by: Zailani, Abdullah, et al.
Published: (2014)
Data Mining for Education Decision Support: A Review
by: Suhirman, Suhirman, et al.
Published: (2014)
by: Suhirman, Suhirman, et al.
Published: (2014)
JOMS: System architecture for telemetry and visualization on unmanned vehicle
by: Khalid, Hasnan, et al.
Published: (2012)
by: Khalid, Hasnan, et al.
Published: (2012)
WLAR-Viz: Weighted least association rules visualization
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
DFP-growth: An efficient algorithm for mining frequent patterns in dynamic database
by: Zailani, Abdullah, et al.
Published: (2012)
by: Zailani, Abdullah, et al.
Published: (2012)
Scalable technique to discover items support from trie data structure
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
On soft partition attribute selection
by: Rabiei, Mamat, et al.
Published: (2012)
by: Rabiei, Mamat, et al.
Published: (2012)
Mining significant association rules from educational data using critical relative support approach
by: Zailani, Abdullah, et al.
Published: (2011)
by: Zailani, Abdullah, et al.
Published: (2011)
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
Fuzzy C mean clustering in off-line handwriting signature verfication system
by: Lee, Beng Yong
Published: (2006)
by: Lee, Beng Yong
Published: (2006)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)
by: Badshah, Gran, et al.
Published: (2012)
Extracting highly positive association rules from students' enrollment data
by: Zailani, Abdullah, et al.
Published: (2011)
by: Zailani, Abdullah, et al.
Published: (2011)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
Feature level fusion of face and signature using a modified feature selection technique
by: Suryanti, Awang, et al.
Published: (2013)
by: Suryanti, Awang, et al.
Published: (2013)
Similar Items
-
Performance Analysis on the Effect of G.729, Speex and GSM Speech Codec on 802.11g Wireless Local Area Network over VoIP using Packet Jitter
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013) -
Classification of metamorphic virus using n-grams signatures
by: A Hamid, Isredza Rahmi, et al.
Published: (2020) -
Detecting JFIF header using FORHEADER
by: Kamaruddin Malik, Mohamad, et al.
Published: (2011) -
BioHealthCloud: A Biometric Worldwide Public Cloud Infrastructure
by: M. A., Ameedeen, et al.
Published: (2014) -
Experimental Analysis on Available Bandwidth Estimation Tools for Wireless Mesh Network
by: Imran Edzereiq, Kamarudin, et al.
Published: (2015)