Convolutional Long Short-Term Memory for fileless malware detection
In the realm of cybersecurity, the rise of fileless malware presents a significant challenge to endpoint security. Traditional malware detection methods often fall short against these sophisticated attacks, necessitating the use of advanced techniques such as deep learning models. This study addr...
| Main Author: | Kareegalan, Kunaprasan |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2024
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/119873/ http://psasir.upm.edu.my/id/eprint/119873/1/119873.pdf |
Similar Items
Convolutional long short-term memory for fileless malware detection
by: Kareegalan, Kunaprasan, et al.
Published: (2025)
by: Kareegalan, Kunaprasan, et al.
Published: (2025)
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)
by: Mohamad Har, Harmi Armira
Published: (2018)
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014)
by: Damshenas, Mohsen
Published: (2014)
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019)
by: Lee, Nani Yer Fui
Published: (2019)
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019)
by: Mohammad Salehi, .
Published: (2019)
Permission extraction framework for android malware detection
by: Ghasempour, Ali
Published: (2019)
by: Ghasempour, Ali
Published: (2019)
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
by: Abdul Razak, Aina Nabila
Published: (2019)
by: Abdul Razak, Aina Nabila
Published: (2019)
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
Improving malicious detection rate for Facebook application in OSN platform
by: Angamuthu, Laavanya
Published: (2018)
by: Angamuthu, Laavanya
Published: (2018)
A collocated multi-mobile collaborative system with hover connectivity initiation and seamless multi-touch interactivity
by: Teo, Rhun Ming
Published: (2018)
by: Teo, Rhun Ming
Published: (2018)
Traffic congestion simulation system using rule based / Muhammad Azrul Naim Ramli
by: Ramli, Muhammad Azrul Naim
Published: (2020)
by: Ramli, Muhammad Azrul Naim
Published: (2020)
Enhanced cuckoo malware analysis performance using cloud computing
by: Barakat, Osamah Lutf Hamood
Published: (2013)
by: Barakat, Osamah Lutf Hamood
Published: (2013)
Contact tracing strategy to isolate infectious bots in mitigating iot botnet propagation and preserve object of forensic interest
by: Ibrahim, Mohammed
Published: (2021)
by: Ibrahim, Mohammed
Published: (2021)
The effect of varying kilovoltage (kVp) and tube current (mAs) on the image quality and dose of CTA head phantom / Sity Noor Ayseah Dzulkafli
by: Dzulkafli, Sity Noor Ayseah
Published: (2015)
by: Dzulkafli, Sity Noor Ayseah
Published: (2015)
A new approach for instance-based schema matching
by: Mahdi, Osamah Abdul Sattar
Published: (2014)
by: Mahdi, Osamah Abdul Sattar
Published: (2014)
Handwritten Bangla numeral recognition using deep long short term memory
by: Ahmed, Mahtab, et al.
Published: (2017)
by: Ahmed, Mahtab, et al.
Published: (2017)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Invigilation timetabling system using genetic algorithm (GA) / Shahirah Mohamed Hatim
by: Shahirah, Mohamed Hatim
Published: (2011)
by: Shahirah, Mohamed Hatim
Published: (2011)
Comparison of MPI benchmark programs on shared memory and distributed memory machines (point-to-point communication)
by: Abdul Hamid, Nor Asilah Wati, et al.
Published: (2010)
by: Abdul Hamid, Nor Asilah Wati, et al.
Published: (2010)
Predicting Bitcoin and Ethereum prices using long short-term memory and gated recurrent unit
by: Mohd Haziq, Abdul Hadi, et al.
Published: (2023)
by: Mohd Haziq, Abdul Hadi, et al.
Published: (2023)
Chiller power consumption forecasting for commercial building based on hybrid convolution neural networks-long short-term memory model with barnacles mating optimizer
by: Mohd Herwan, Sulaiman, et al.
Published: (2025)
by: Mohd Herwan, Sulaiman, et al.
Published: (2025)
Robust execution of belief-desire-intention-based agent programs
by: Yao, Yuan
Published: (2017)
by: Yao, Yuan
Published: (2017)
Mobile fever diagnosis expert system / Mohd Nashrullah Zulfakar
by: Mohd Nashrullah, Zulfakar
Published: (2014)
by: Mohd Nashrullah, Zulfakar
Published: (2014)
Effect of fuzzy resource allocation method on AIRS classifier accuracy
by: Golzari, Shahram, et al.
Published: (2009)
by: Golzari, Shahram, et al.
Published: (2009)
Modelling of biogas production process with evolutionary artificial neural network and genetic algorithm
by: Fakharudin, Abdul Sahli
Published: (2017)
by: Fakharudin, Abdul Sahli
Published: (2017)
Toward Accountable and Explainable Artificial Intelligence Part one: Theory and Examples
by: Khan, Masood, et al.
Published: (2022)
by: Khan, Masood, et al.
Published: (2022)
Toward Accountable and Explainable Artificial Intelligence Part Two: The Framework Implementation
by: Vice, Jordan, et al.
Published: (2022)
by: Vice, Jordan, et al.
Published: (2022)
How can SMEs adopt AI for accounting processes in Singapore despite challenges like cost or technical expertise?
by: Leong, Pui Yie
Published: (2024)
by: Leong, Pui Yie
Published: (2024)
Artificial intelligence-based tool condition monitoring in robotic incremental sheet forming through vibration, tool wear and surface roughness analyses
by: Ismail, Nazarul Abidin
Published: (2021)
by: Ismail, Nazarul Abidin
Published: (2021)
Prediction of international rice production using long short- term memory and machine learning models
by: Arya, Suraj, et al.
Published: (2025)
by: Arya, Suraj, et al.
Published: (2025)
Theories of parenting and their application to artificial intelligence
by: Croeser, Sky, et al.
Published: (2019)
by: Croeser, Sky, et al.
Published: (2019)
Genetic programming for modelling of geotechnical engineering systems
by: Shahin, Mohamed
Published: (2015)
by: Shahin, Mohamed
Published: (2015)
The efficacy of computed tomography (CT) scan and magnetic resonance imaging (MRI) in detecting hepatocellular carcinoma (HCC): retrospective study / Nurain Osman
by: Osman, Nurain
Published: (2015)
by: Osman, Nurain
Published: (2015)
Machine Learning Malware Detection For Android
by: Amir Muhammad Hafiz, Othman
Published: (2022)
by: Amir Muhammad Hafiz, Othman
Published: (2022)
An agent on my shoulder: AI, privacy and the application of human-like computing technologies to music creation
by: Chamberlain, Alan, et al.
Published: (2017)
by: Chamberlain, Alan, et al.
Published: (2017)
Hybrid pre-classification technique – artificial neural network for lightning severity classification
by: Omar, Muhammad Azhar
Published: (2014)
by: Omar, Muhammad Azhar
Published: (2014)
The validity of resonant field imaging (RFI) frequency counter in measuring psychological stress levels in comparison with clinical and biological stress markers / Nurul Iwani Abdullah
by: Abdullah, Nurul Iwani
Published: (2015)
by: Abdullah, Nurul Iwani
Published: (2015)
Paediatric transoral robotic-assisted adenotonsillectomy: a new anaesthetic experience in Malaysia / Zawiah Kassim … [et al.]
by: Kassim, Zawiah, et al.
Published: (2019)
by: Kassim, Zawiah, et al.
Published: (2019)
Detecting change and dealing with uncertainty in imperfect evolutionary environments
by: Mujtaba, Hasan, et al.
Published: (2015)
by: Mujtaba, Hasan, et al.
Published: (2015)
Generative AI Glitches: The Artificial Everything
by: Srdarov, Suzanne, et al.
Published: (2024)
by: Srdarov, Suzanne, et al.
Published: (2024)
Similar Items
-
Convolutional long short-term memory for fileless malware detection
by: Kareegalan, Kunaprasan, et al.
Published: (2025) -
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018) -
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014) -
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019) -
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019)