Design of cloud-enabled cross-platform malware analysis systems
The Internet of Thing (IoT) is already gaining momentum in the society by creating links between virtual technology and physical world. As the forecasts show, the number of devices connected to the Internet may rise to 100 billion devices by the end of the current decade. The dark side of this era,...
| Main Author: | Najafabadi, Seyed Abdolrahman Mousavian |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/70249/ http://psasir.upm.edu.my/id/eprint/70249/1/FK%202017%20131%20-%20IR.pdf |
Similar Items
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019)
by: Lee, Nani Yer Fui
Published: (2019)
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014)
by: Damshenas, Mohsen
Published: (2014)
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
by: Abdul Razak, Aina Nabila
Published: (2019)
by: Abdul Razak, Aina Nabila
Published: (2019)
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019)
by: Mohammad Salehi, .
Published: (2019)
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)
by: Mohamad Har, Harmi Armira
Published: (2018)
Enhanced cuckoo malware analysis performance using cloud computing
by: Barakat, Osamah Lutf Hamood
Published: (2013)
by: Barakat, Osamah Lutf Hamood
Published: (2013)
Permission extraction framework for android malware detection
by: Ghasempour, Ali
Published: (2019)
by: Ghasempour, Ali
Published: (2019)
Convolutional Long Short-Term Memory for fileless malware detection
by: Kareegalan, Kunaprasan
Published: (2024)
by: Kareegalan, Kunaprasan
Published: (2024)
A platform for controlling robotic manipulators using cloud computing power
by: Moghrabiah, Mohammed Yasser
Published: (2019)
by: Moghrabiah, Mohammed Yasser
Published: (2019)
An analysis method of forensic investigation for platform-as-a-service cloud storage services
by: Shaerpour, Kaveh
Published: (2016)
by: Shaerpour, Kaveh
Published: (2016)
Contact tracing strategy to isolate infectious bots in mitigating iot botnet propagation and preserve object of forensic interest
by: Ibrahim, Mohammed
Published: (2021)
by: Ibrahim, Mohammed
Published: (2021)
Improving malicious detection rate for Facebook application in OSN platform
by: Angamuthu, Laavanya
Published: (2018)
by: Angamuthu, Laavanya
Published: (2018)
Scheduling tight deadlines for scientific workflows in the cloud
by: Bajaher, Awadh Salem Saleh
Published: (2018)
by: Bajaher, Awadh Salem Saleh
Published: (2018)
Performance analysis on multi-attribute combinatorial double auction model for resource allocation in cloud computing
by: Mohamed El-Sherksi, Suad Abdalla
Published: (2017)
by: Mohamed El-Sherksi, Suad Abdalla
Published: (2017)
Self-healing framework for service level agreement monitoring and violation reacting in cloud computing
by: Mosallanejad, Ahmad
Published: (2014)
by: Mosallanejad, Ahmad
Published: (2014)
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018)
by: Rashid, Mustafa Noori
Published: (2018)
Organizational level continuance model of cloud computing for higher education institutions
by: Mohammed, Qasem Yousef Abdulelah
Published: (2021)
by: Mohammed, Qasem Yousef Abdulelah
Published: (2021)
Workflow system for MapReduce in cloud environment
by: Wadi, Muntadher Saadoon
Published: (2017)
by: Wadi, Muntadher Saadoon
Published: (2017)
Impatient job scheduling under cloud computing
by: Mahdi, Nawfal A.
Published: (2012)
by: Mahdi, Nawfal A.
Published: (2012)
Implementation framework based on design refinements for systematic migration of legacy applications to cloud
by: Rana, Muhammad Ehsan
Published: (2020)
by: Rana, Muhammad Ehsan
Published: (2020)
Dynamic load balancing algorithm based on deadline constrained in cloud environment
by: Mansur, Muzzammil
Published: (2019)
by: Mansur, Muzzammil
Published: (2019)
An optimal tasks scheduling algorithm based on QoS in cloud computing network
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
Malware detection system using cloud sandbox, machine learning
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
A Framework for User Feedback Based Cloud Service Monitoring
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Mobile synchronization framework to enhance large object management in mobile cloud storage service
by: Faniband, Yunus Parvej
Published: (2021)
by: Faniband, Yunus Parvej
Published: (2021)
Formulating a security layer of cloud data storage framework based on multi agent system architecture.
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
Cloud intrusion detection systems: fuzzy logic and classifications
by: Alqahtani, Saeed Masaud H.
Published: (2017)
by: Alqahtani, Saeed Masaud H.
Published: (2017)
SLA-Based Trust Model for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Cloud forensic: Technical challenges, solutions and comparative analysis
by: Pichan, A., et al.
Published: (2015)
by: Pichan, A., et al.
Published: (2015)
A survey on SLA and performance measurement in cloud computing
by: Alhamad, Mohammed, et al.
Published: (2011)
by: Alhamad, Mohammed, et al.
Published: (2011)
Collect and disseminate layer protocol for searching cloud services
by: Arvaree @ Alvar, Thamilvaani
Published: (2014)
by: Arvaree @ Alvar, Thamilvaani
Published: (2014)
Resource allocation for job optimization in multi-cloud environment
by: Mohamaddiah, Mohd Hairy
Published: (2023)
by: Mohamaddiah, Mohd Hairy
Published: (2023)
Cloud Assessment Learning Environment
by: Steele, A., et al.
Published: (2014)
by: Steele, A., et al.
Published: (2014)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
by: Fadhil, Mohammed Alaa
Published: (2023)
by: Fadhil, Mohammed Alaa
Published: (2023)
A multi-level framework for efficient sensitive data transmission in cloud computing
by: Muhasin, Haifaa Jassim
Published: (2019)
by: Muhasin, Haifaa Jassim
Published: (2019)
Quality of service model for software as a service in cloud computing from users' and providers' perspectives
by: Khanjani, Atieh
Published: (2015)
by: Khanjani, Atieh
Published: (2015)
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
by: Mohd Ali, Fazlina
Published: (2022)
by: Mohd Ali, Fazlina
Published: (2022)
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
by: Naha, Ranesh Kumar
Published: (2015)
by: Naha, Ranesh Kumar
Published: (2015)
Improving energy consumption in cloud computing datacenters using a combination of energy-aware resource allocation and scheduling mechanism
by: Khalil Abd., Sura
Published: (2017)
by: Khalil Abd., Sura
Published: (2017)
Similar Items
-
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019) -
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014) -
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
by: Abdul Razak, Aina Nabila
Published: (2019) -
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019) -
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)