SCARECROW: scalable malware reporting, detection and analysis
Malware is the main computer security threat that can cause damage to user's devices and company's infrastructure. End users who want to download executable files from the Internet are currently presented by a binary choice (OK or Cancel) but there is no viable third alternative for uncert...
| Main Authors: | Barakat, Osamah Lutf Hamood, Hashim, Shaiful Jahari, Raja Abdullah, Raja Syamsul Azmir, Ramli, Abdul Rahman, Hashim, Fazirulhisyam, Samsudin, Khairulmizam, Al-Baltah, Ibrahim Ahmed, Al-Habshi, Mohamed Mustafa |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Advanced Institute of Convergence Information Technology
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/28638/ http://psasir.upm.edu.my/id/eprint/28638/1/28638.pdf |
Similar Items
Malware analysis performance enhancement using cloud computing
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2014)
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2014)
Enhanced cuckoo malware analysis performance using cloud computing
by: Barakat, Osamah Lutf Hamood
Published: (2013)
by: Barakat, Osamah Lutf Hamood
Published: (2013)
Quiescent center initiation in the Arabidopsislateral root primordia is dependent on the SCARECROW transcription factor
by: Goh, Tatsuaki, et al.
Published: (2016)
by: Goh, Tatsuaki, et al.
Published: (2016)
Machine and deep learning-based XSS detection approaches: a systematic literature review
by: Thajeel, Isam Kareem, et al.
Published: (2023)
by: Thajeel, Isam Kareem, et al.
Published: (2023)
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
by: Kareem Thajeel, Isam, et al.
Published: (2023)
by: Kareem Thajeel, Isam, et al.
Published: (2023)
Secure group communication scheme in wireless IPv6 networks: an experimental test-bed
by: Mehdizadeh, Abbas, et al.
Published: (2012)
by: Mehdizadeh, Abbas, et al.
Published: (2012)
Malware classification framework for dynamic analysis using Information Theory
by: Moshiri, Ehsan, et al.
Published: (2017)
by: Moshiri, Ehsan, et al.
Published: (2017)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
by: Al-Dabbagh, Mohanad Dawood, et al.
Published: (2015)
by: Al-Dabbagh, Mohanad Dawood, et al.
Published: (2015)
An overview of scalable video streaming
by: Abumuala, Mohammed, et al.
Published: (2011)
by: Abumuala, Mohammed, et al.
Published: (2011)
Short animated project scarecrow: study of anthropomorphisms characteristic on Totoro (1988), Mickey Mouse (1928), and Sang Kancil (1983) / Brigette Robin
by: Robin, Brigette
Published: (2017)
by: Robin, Brigette
Published: (2017)
Availability evaluation of scalable complex networks
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2012)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2012)
Differential evolution algorithm for linear frequency modulation radar signal denoising
by: Al-Dabbagh, Mohanad Dawood Hasan, et al.
Published: (2013)
by: Al-Dabbagh, Mohanad Dawood Hasan, et al.
Published: (2013)
Scalable and secure SDN based ethernet architecture by suppressing broadcast traffic
by: Munther, Munther Numan, et al.
Published: (2021)
by: Munther, Munther Numan, et al.
Published: (2021)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
Wavelet-based pre-filtering for low cost inertial sensors
by: Hasan, Ahmed Mudheher, et al.
Published: (2010)
by: Hasan, Ahmed Mudheher, et al.
Published: (2010)
Automatic estimation of inertial navigation system errors for global positioning system outage recovery
by: Hasan, Ahmed Mudheher, et al.
Published: (2011)
by: Hasan, Ahmed Mudheher, et al.
Published: (2011)
Comparative study on wavelet filter and thresholding selection for GPS/INS data fusion
by: Hasan, Ahmed M., et al.
Published: (2010)
by: Hasan, Ahmed M., et al.
Published: (2010)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
Secure multicast group communication scheme in wireless IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2014)
by: Mehdizadeh, Abbas, et al.
Published: (2014)
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Development Of Location Based Services For Geocoding And Recording Road Accidents Data
by: Al-Habshi, Mohammed Mustafa
Published: (2008)
by: Al-Habshi, Mohammed Mustafa
Published: (2008)
Effects of emission from different UWB short-range communication devices
by: Arvin, Farshad, et al.
Published: (2011)
by: Arvin, Farshad, et al.
Published: (2011)
Quality-improved and secure multicast delivery method in mobile IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2011)
by: Mehdizadeh, Abbas, et al.
Published: (2011)
Complexity evaluation in scalable video coding
by: Maarif, Haris Al Qodri, et al.
Published: (2010)
by: Maarif, Haris Al Qodri, et al.
Published: (2010)
Scalable video coding : a review
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Malware mobile devices in Indonesia
by: Drajad, Wiryawan, et al.
Published: (2019)
by: Drajad, Wiryawan, et al.
Published: (2019)
Optimization of power utilization in multi-mobile robot foraging behavior inspired by honeybees system
by: Ahmad, Faisul Arif, et al.
Published: (2014)
by: Ahmad, Faisul Arif, et al.
Published: (2014)
Energy management in mobile robotics system based on biologically inspired honeybees behavior
by: Ahmad, Faisul Arif, et al.
Published: (2011)
by: Ahmad, Faisul Arif, et al.
Published: (2011)
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014)
by: Teh, Jia Yew, et al.
Published: (2014)
Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM
by: Yew, Teh Jia, et al.
Published: (2013)
by: Yew, Teh Jia, et al.
Published: (2013)
GPU accelerated stereo vision system to capture handwriting information
by: Fadi Imad, et al.
Published: (2019)
by: Fadi Imad, et al.
Published: (2019)
RCS predictions through angle of ground moving target using LTE-based passive forward scattering radar
by: Abdul Aziz, Noor Hafizah, et al.
Published: (2017)
by: Abdul Aziz, Noor Hafizah, et al.
Published: (2017)
Enhancing geographic coordinates representation standard for reverse geocoding web services
by: Al-Habshi, Mohammed Mustafa Abdulrahman
Published: (2018)
by: Al-Habshi, Mohammed Mustafa Abdulrahman
Published: (2018)
Development of a scalable video compression algorithm
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Similar Items
-
Malware analysis performance enhancement using cloud computing
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2014) -
Enhanced cuckoo malware analysis performance using cloud computing
by: Barakat, Osamah Lutf Hamood
Published: (2013) -
Quiescent center initiation in the Arabidopsislateral root primordia is dependent on the SCARECROW transcription factor
by: Goh, Tatsuaki, et al.
Published: (2016) -
Machine and deep learning-based XSS detection approaches: a systematic literature review
by: Thajeel, Isam Kareem, et al.
Published: (2023) -
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
by: Kareem Thajeel, Isam, et al.
Published: (2023)