Malware analysis performance enhancement using cloud computing
Nowadays, computer based technology has taken a central role in every person life. Hence, damage caused by malicious software (malware) can reach and effect many people globally as what could be in the early days of computer. A close look at the current approaches of malware analysis shows that the...
| Main Authors: | Barakat, Osamah Lutf Hamood, Hashim, Shaiful Jahari, Raja Abdullah, Raja Syamsul Azmir, Ramli, Abdul Rahman, Hashim, Fazirulhisyam, Samsudin, Khairulmizam, Ab Rahman, Mahmud |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/34432/ http://psasir.upm.edu.my/id/eprint/34432/1/Malware%20analysis%20performance%20enhancement%20using%20cloud%20computing.pdf |
Similar Items
Enhanced cuckoo malware analysis performance using cloud computing
by: Barakat, Osamah Lutf Hamood
Published: (2013)
by: Barakat, Osamah Lutf Hamood
Published: (2013)
SCARECROW: scalable malware reporting, detection and analysis
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
Malware detection system using cloud sandbox, machine learning
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019)
by: Lee, Nani Yer Fui
Published: (2019)
Machine and deep learning-based XSS detection approaches: a systematic literature review
by: Thajeel, Isam Kareem, et al.
Published: (2023)
by: Thajeel, Isam Kareem, et al.
Published: (2023)
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
by: Kareem Thajeel, Isam, et al.
Published: (2023)
by: Kareem Thajeel, Isam, et al.
Published: (2023)
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Secure group communication scheme in wireless IPv6 networks: an experimental test-bed
by: Mehdizadeh, Abbas, et al.
Published: (2012)
by: Mehdizadeh, Abbas, et al.
Published: (2012)
Wavelet-based pre-filtering for low cost inertial sensors
by: Hasan, Ahmed Mudheher, et al.
Published: (2010)
by: Hasan, Ahmed Mudheher, et al.
Published: (2010)
Automatic estimation of inertial navigation system errors for global positioning system outage recovery
by: Hasan, Ahmed Mudheher, et al.
Published: (2011)
by: Hasan, Ahmed Mudheher, et al.
Published: (2011)
Comparative study on wavelet filter and thresholding selection for GPS/INS data fusion
by: Hasan, Ahmed M., et al.
Published: (2010)
by: Hasan, Ahmed M., et al.
Published: (2010)
Optimization of power utilization in multi-mobile robot foraging behavior inspired by honeybees system
by: Ahmad, Faisul Arif, et al.
Published: (2014)
by: Ahmad, Faisul Arif, et al.
Published: (2014)
Energy management in mobile robotics system based on biologically inspired honeybees behavior
by: Ahmad, Faisul Arif, et al.
Published: (2011)
by: Ahmad, Faisul Arif, et al.
Published: (2011)
An effective approach for managing power consumption in cloud computing infrastructure
by: Khalil Abd, Sura, et al.
Published: (2017)
by: Khalil Abd, Sura, et al.
Published: (2017)
Malware classification framework for dynamic analysis using Information Theory
by: Moshiri, Ehsan, et al.
Published: (2017)
by: Moshiri, Ehsan, et al.
Published: (2017)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
A review of navigation systems (integration and algorithms)
by: Hasan, Ahmed Mudheher, et al.
Published: (2009)
by: Hasan, Ahmed Mudheher, et al.
Published: (2009)
Integration of global positioning system and inertial navigation system with different sampling rate using adaptive neuro fuzzy inference system
by: Hasan, Ahmed M., et al.
Published: (2009)
by: Hasan, Ahmed M., et al.
Published: (2009)
Authentication process enhancements in WiMAX networks
by: Alezabi, Kamal Ali, et al.
Published: (2016)
by: Alezabi, Kamal Ali, et al.
Published: (2016)
Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics
by: Ahmad, Firdaus, et al.
Published: (2017)
by: Ahmad, Firdaus, et al.
Published: (2017)
Bandwidth enhancement for microstrip antenna in wireless applications
by: Raja Abdullah, Raja Syamsul Azmir, et al.
Published: (2008)
by: Raja Abdullah, Raja Syamsul Azmir, et al.
Published: (2008)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
Secure multicast group communication scheme in wireless IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2014)
by: Mehdizadeh, Abbas, et al.
Published: (2014)
A performance optimization model of task scheduling towards green cloud computing
by: Hussin, Masnida, et al.
Published: (2016)
by: Hussin, Masnida, et al.
Published: (2016)
Cloud of Word vs DroidKungfu: Performance evaluation in detecting root exploit malware with deep learning approach
by: Che Akmal, Che Yahaya, et al.
Published: (2023)
by: Che Akmal, Che Yahaya, et al.
Published: (2023)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
Effects of emission from different UWB short-range communication devices
by: Arvin, Farshad, et al.
Published: (2011)
by: Arvin, Farshad, et al.
Published: (2011)
Quality-improved and secure multicast delivery method in mobile IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2011)
by: Mehdizadeh, Abbas, et al.
Published: (2011)
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Malware mobile devices in Indonesia
by: Drajad, Wiryawan, et al.
Published: (2019)
by: Drajad, Wiryawan, et al.
Published: (2019)
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014)
by: Teh, Jia Yew, et al.
Published: (2014)
Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM
by: Yew, Teh Jia, et al.
Published: (2013)
by: Yew, Teh Jia, et al.
Published: (2013)
GPU accelerated stereo vision system to capture handwriting information
by: Fadi Imad, et al.
Published: (2019)
by: Fadi Imad, et al.
Published: (2019)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
by: Al-Dabbagh, Mohanad Dawood, et al.
Published: (2015)
by: Al-Dabbagh, Mohanad Dawood, et al.
Published: (2015)
RCS predictions through angle of ground moving target using LTE-based passive forward scattering radar
by: Abdul Aziz, Noor Hafizah, et al.
Published: (2017)
by: Abdul Aziz, Noor Hafizah, et al.
Published: (2017)
Similar Items
-
Enhanced cuckoo malware analysis performance using cloud computing
by: Barakat, Osamah Lutf Hamood
Published: (2013) -
SCARECROW: scalable malware reporting, detection and analysis
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013) -
Malware detection system using cloud sandbox, machine learning
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022) -
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019) -
Machine and deep learning-based XSS detection approaches: a systematic literature review
by: Thajeel, Isam Kareem, et al.
Published: (2023)