Improving malicious detection rate for Facebook application in OSN platform
Online social networks (OSNs) have become the new vector for cybercrime, and hackers are finding new ways to propagate spam and malware on these platforms, which we refer to as social malware. As we show here, social malware cannot be identified with existing security mechanisms (e.g., URL blacklist...
| Main Author: | Angamuthu, Laavanya |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/68968/ http://psasir.upm.edu.my/id/eprint/68968/1/FSKTM%202018%2041%20IR.pdf |
Similar Items
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)
by: Mohamad Har, Harmi Armira
Published: (2018)
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019)
by: Lee, Nani Yer Fui
Published: (2019)
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
by: Abdul Razak, Aina Nabila
Published: (2019)
by: Abdul Razak, Aina Nabila
Published: (2019)
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014)
by: Damshenas, Mohsen
Published: (2014)
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019)
by: Mohammad Salehi, .
Published: (2019)
Contact tracing strategy to isolate infectious bots in mitigating iot botnet propagation and preserve object of forensic interest
by: Ibrahim, Mohammed
Published: (2021)
by: Ibrahim, Mohammed
Published: (2021)
Permission extraction framework for android malware detection
by: Ghasempour, Ali
Published: (2019)
by: Ghasempour, Ali
Published: (2019)
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Convolutional Long Short-Term Memory for fileless malware detection
by: Kareegalan, Kunaprasan
Published: (2024)
by: Kareegalan, Kunaprasan
Published: (2024)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
An improved user authentication model for mobile application systems
by: Mohamed, Kartini
Published: (2017)
by: Mohamed, Kartini
Published: (2017)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
Ketidaksantunan berbahasa dalam media sosial Facebook / Afifah Nurfarhanis Roslan
by: Roslan, Afifah Nurfarhanis
Published: (2016)
by: Roslan, Afifah Nurfarhanis
Published: (2016)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Windows 10 instant messaging application forensics
by: Shehu, Aliyu Usman
Published: (2018)
by: Shehu, Aliyu Usman
Published: (2018)
Protecting network with Cisco solution
Published: (2008)
Published: (2008)
Enacting friendship and negotiation online identities in facebook among a group of Malaysians
by: Lai, Yuh Ying
Published: (2014)
by: Lai, Yuh Ying
Published: (2014)
Impak rangsangan visual provokatif dalam Facebook terhadap perubahan emosi individu Introvert dan Ekstrovert
by: Mohd Radzi, Siti Ramizah Khairunnisa
Published: (2016)
by: Mohd Radzi, Siti Ramizah Khairunnisa
Published: (2016)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Relationship between facebook usage and attitude with facebook addiction among Malaysian female university students
by: Syed Zainudin, Sharifah Sofiah
Published: (2013)
by: Syed Zainudin, Sharifah Sofiah
Published: (2013)
Adaptive artificial neural network for power system security assessment and control action
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
DDOS avoidance strategy for service avalibilty
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
An Education in Facebook
by: Allen, Matthew
Published: (2012)
by: Allen, Matthew
Published: (2012)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
Similar Items
-
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018) -
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019) -
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
by: Abdul Razak, Aina Nabila
Published: (2019) -
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014) -
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)