A dynamic malware detection in cloud platform
Cloud Computing platform is the practices of remote manage network resources such as storage, application hosted on the internet rather than physical server or personal computer. Hence cloud computing not only provides high availability on elastic resources, scalable and cost efficient. This is why...
| Main Author: | Lee, Nani Yer Fui |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/83868/ http://psasir.upm.edu.my/id/eprint/83868/1/FSKTM%202019%2041%20-%20IR.pdf |
Similar Items
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014)
by: Damshenas, Mohsen
Published: (2014)
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019)
by: Mohammad Salehi, .
Published: (2019)
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
by: Abdul Razak, Aina Nabila
Published: (2019)
by: Abdul Razak, Aina Nabila
Published: (2019)
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)
by: Mohamad Har, Harmi Armira
Published: (2018)
Permission extraction framework for android malware detection
by: Ghasempour, Ali
Published: (2019)
by: Ghasempour, Ali
Published: (2019)
Convolutional Long Short-Term Memory for fileless malware detection
by: Kareegalan, Kunaprasan
Published: (2024)
by: Kareegalan, Kunaprasan
Published: (2024)
Enhanced cuckoo malware analysis performance using cloud computing
by: Barakat, Osamah Lutf Hamood
Published: (2013)
by: Barakat, Osamah Lutf Hamood
Published: (2013)
Improving malicious detection rate for Facebook application in OSN platform
by: Angamuthu, Laavanya
Published: (2018)
by: Angamuthu, Laavanya
Published: (2018)
A platform for controlling robotic manipulators using cloud computing power
by: Moghrabiah, Mohammed Yasser
Published: (2019)
by: Moghrabiah, Mohammed Yasser
Published: (2019)
Contact tracing strategy to isolate infectious bots in mitigating iot botnet propagation and preserve object of forensic interest
by: Ibrahim, Mohammed
Published: (2021)
by: Ibrahim, Mohammed
Published: (2021)
An analysis method of forensic investigation for platform-as-a-service cloud storage services
by: Shaerpour, Kaveh
Published: (2016)
by: Shaerpour, Kaveh
Published: (2016)
Dynamic load balancing algorithm based on deadline constrained in cloud environment
by: Mansur, Muzzammil
Published: (2019)
by: Mansur, Muzzammil
Published: (2019)
Scheduling tight deadlines for scientific workflows in the cloud
by: Bajaher, Awadh Salem Saleh
Published: (2018)
by: Bajaher, Awadh Salem Saleh
Published: (2018)
Self-healing framework for service level agreement monitoring and violation reacting in cloud computing
by: Mosallanejad, Ahmad
Published: (2014)
by: Mosallanejad, Ahmad
Published: (2014)
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018)
by: Rashid, Mustafa Noori
Published: (2018)
Organizational level continuance model of cloud computing for higher education institutions
by: Mohammed, Qasem Yousef Abdulelah
Published: (2021)
by: Mohammed, Qasem Yousef Abdulelah
Published: (2021)
Malware detection system using cloud sandbox, machine learning
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
Performance analysis on multi-attribute combinatorial double auction model for resource allocation in cloud computing
by: Mohamed El-Sherksi, Suad Abdalla
Published: (2017)
by: Mohamed El-Sherksi, Suad Abdalla
Published: (2017)
Impatient job scheduling under cloud computing
by: Mahdi, Nawfal A.
Published: (2012)
by: Mahdi, Nawfal A.
Published: (2012)
Cloud intrusion detection systems: fuzzy logic and classifications
by: Alqahtani, Saeed Masaud H.
Published: (2017)
by: Alqahtani, Saeed Masaud H.
Published: (2017)
A Framework for User Feedback Based Cloud Service Monitoring
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
An optimal tasks scheduling algorithm based on QoS in cloud computing network
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
Mobile synchronization framework to enhance large object management in mobile cloud storage service
by: Faniband, Yunus Parvej
Published: (2021)
by: Faniband, Yunus Parvej
Published: (2021)
A survey on SLA and performance measurement in cloud computing
by: Alhamad, Mohammed, et al.
Published: (2011)
by: Alhamad, Mohammed, et al.
Published: (2011)
Workflow system for MapReduce in cloud environment
by: Wadi, Muntadher Saadoon
Published: (2017)
by: Wadi, Muntadher Saadoon
Published: (2017)
Adaptable service level agreement evaluation framework based on dynamic monitoring interval in cloud computing
by: Mohd Jamail, Nor Shahida
Published: (2016)
by: Mohd Jamail, Nor Shahida
Published: (2016)
SLA-Based Trust Model for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
A multi-level framework for efficient sensitive data transmission in cloud computing
by: Muhasin, Haifaa Jassim
Published: (2019)
by: Muhasin, Haifaa Jassim
Published: (2019)
Collect and disseminate layer protocol for searching cloud services
by: Arvaree @ Alvar, Thamilvaani
Published: (2014)
by: Arvaree @ Alvar, Thamilvaani
Published: (2014)
Resource allocation for job optimization in multi-cloud environment
by: Mohamaddiah, Mohd Hairy
Published: (2023)
by: Mohamaddiah, Mohd Hairy
Published: (2023)
Cloud Assessment Learning Environment
by: Steele, A., et al.
Published: (2014)
by: Steele, A., et al.
Published: (2014)
Formulating a security layer of cloud data storage framework based on multi agent system architecture.
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
by: Fadhil, Mohammed Alaa
Published: (2023)
by: Fadhil, Mohammed Alaa
Published: (2023)
Quality of service model for software as a service in cloud computing from users' and providers' perspectives
by: Khanjani, Atieh
Published: (2015)
by: Khanjani, Atieh
Published: (2015)
Implementation framework based on design refinements for systematic migration of legacy applications to cloud
by: Rana, Muhammad Ehsan
Published: (2020)
by: Rana, Muhammad Ehsan
Published: (2020)
Improving energy consumption in cloud computing datacenters using a combination of energy-aware resource allocation and scheduling mechanism
by: Khalil Abd., Sura
Published: (2017)
by: Khalil Abd., Sura
Published: (2017)
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
by: Mohd Ali, Fazlina
Published: (2022)
by: Mohd Ali, Fazlina
Published: (2022)
A Framework to Assess Readiness of Firms for Cloud Manufacturing
by: Jayasekara, Deepesh Chathuranga
Published: (2018)
by: Jayasekara, Deepesh Chathuranga
Published: (2018)
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
by: Naha, Ranesh Kumar
Published: (2015)
by: Naha, Ranesh Kumar
Published: (2015)
Similar Items
-
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016) -
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014) -
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019) -
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
by: Abdul Razak, Aina Nabila
Published: (2019) -
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)