Enhanced cuckoo malware analysis performance using cloud computing
Modem information technology affects almost every aspect of human existence. Along with numerous positive outcomes, such comprehensive influence of modem technology on everyday life can also create unprecedented opportunities for the dissemination of malicious software within very short time frames....
| Main Author: | Barakat, Osamah Lutf Hamood |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/77619/ http://psasir.upm.edu.my/id/eprint/77619/1/FK%202013%20103%20ir.pdf |
Similar Items
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018)
by: Rashid, Mustafa Noori
Published: (2018)
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019)
by: Lee, Nani Yer Fui
Published: (2019)
Malware analysis performance enhancement using cloud computing
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2014)
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2014)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
A systematic mapping on risks and techniques to enhance security in multi-cloud environments
by: Gonzalez Alberto, Ana Y
Published: (2017)
by: Gonzalez Alberto, Ana Y
Published: (2017)
Performance analysis on multi-attribute combinatorial double auction model for resource allocation in cloud computing
by: Mohamed El-Sherksi, Suad Abdalla
Published: (2017)
by: Mohamed El-Sherksi, Suad Abdalla
Published: (2017)
The impact of Cloud Computing and organizational sustainability
by: Issa, Tomayess, et al.
Published: (2010)
by: Issa, Tomayess, et al.
Published: (2010)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Organizational level continuance model of cloud computing for higher education institutions
by: Mohammed, Qasem Yousef Abdulelah
Published: (2021)
by: Mohammed, Qasem Yousef Abdulelah
Published: (2021)
Impatient job scheduling under cloud computing
by: Mahdi, Nawfal A.
Published: (2012)
by: Mahdi, Nawfal A.
Published: (2012)
Formulating a security layer of cloud data storage framework based on multi agent system architecture.
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
A platform for controlling robotic manipulators using cloud computing power
by: Moghrabiah, Mohammed Yasser
Published: (2019)
by: Moghrabiah, Mohammed Yasser
Published: (2019)
A survey on SLA and performance measurement in cloud computing
by: Alhamad, Mohammed, et al.
Published: (2011)
by: Alhamad, Mohammed, et al.
Published: (2011)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
An optimal tasks scheduling algorithm based on QoS in cloud computing network
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
Digital forensics framework for investigating client cloud storage applications on smartphones
by: Daryabar, Farid
Published: (2015)
by: Daryabar, Farid
Published: (2015)
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
by: Fadhil, Mohammed Alaa
Published: (2023)
by: Fadhil, Mohammed Alaa
Published: (2023)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
Scheduling tight deadlines for scientific workflows in the cloud
by: Bajaher, Awadh Salem Saleh
Published: (2018)
by: Bajaher, Awadh Salem Saleh
Published: (2018)
SLA-Based Trust Model for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Mobile synchronization framework to enhance large object management in mobile cloud storage service
by: Faniband, Yunus Parvej
Published: (2021)
by: Faniband, Yunus Parvej
Published: (2021)
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
by: Naha, Ranesh Kumar
Published: (2015)
by: Naha, Ranesh Kumar
Published: (2015)
A multi-level framework for efficient sensitive data transmission in cloud computing
by: Muhasin, Haifaa Jassim
Published: (2019)
by: Muhasin, Haifaa Jassim
Published: (2019)
Modified workflow scheduling using hybrid PSO-GA algorithm in cloud computing
by: Oke, Omotayo Patrick
Published: (2019)
by: Oke, Omotayo Patrick
Published: (2019)
Improving energy consumption in cloud computing datacenters using a combination of energy-aware resource allocation and scheduling mechanism
by: Khalil Abd., Sura
Published: (2017)
by: Khalil Abd., Sura
Published: (2017)
Self-healing framework for service level agreement monitoring and violation reacting in cloud computing
by: Mosallanejad, Ahmad
Published: (2014)
by: Mosallanejad, Ahmad
Published: (2014)
Multi-objective algorithms for effective resource management in Edge-Fog-Cloud computing
by: Saif, Faten Ameen Mohammed
Published: (2023)
by: Saif, Faten Ameen Mohammed
Published: (2023)
Quality of service model for software as a service in cloud computing from users' and providers' perspectives
by: Khanjani, Atieh
Published: (2015)
by: Khanjani, Atieh
Published: (2015)
Conceptual SLA Framework for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Response time for cloud computing providers
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
by: Mohd Ali, Fazlina
Published: (2022)
by: Mohd Ali, Fazlina
Published: (2022)
Enhance Cloudlet Scheduling Policy (ECSP) using cloudsim toolkit with resubmission fault tolerance mechanism
by: Auzir, Juliza
Published: (2018)
by: Auzir, Juliza
Published: (2018)
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
by: Sa'ad, Suleiman
Published: (2022)
by: Sa'ad, Suleiman
Published: (2022)
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)
by: Mohamad Har, Harmi Armira
Published: (2018)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Workflow system for MapReduce in cloud environment
by: Wadi, Muntadher Saadoon
Published: (2017)
by: Wadi, Muntadher Saadoon
Published: (2017)
Multi-objectives firefly algorithm for task offloading in the edge-fog-cloud computing
by: A. Saif, Faten, et al.
Published: (2024)
by: A. Saif, Faten, et al.
Published: (2024)
An analysis method of forensic investigation for platform-as-a-service cloud storage services
by: Shaerpour, Kaveh
Published: (2016)
by: Shaerpour, Kaveh
Published: (2016)
The Research on How Cloud Computing Impact Primary Education in China
by: He, Ruilin
Published: (2022)
by: He, Ruilin
Published: (2022)
Similar Items
-
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018) -
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016) -
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019) -
Malware analysis performance enhancement using cloud computing
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2014) -
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)