A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
Computer networks have become an important dimension of modern organizations. Thus, ensuring that networks run at peak performance (network utilization and speed running normal without any faults) is considered a crucial step for these organizations. To achieve this goal, networks must be secure bec...
| Main Author: | Anbar, Mohammed F.R. |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/43403/ http://eprints.usm.my/43403/1/Mohammed%20F.R.%20Anbar24.pdf |
Similar Items
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer.
by: Budiarto, Rahmat, et al.
Published: (2007)
by: Budiarto, Rahmat, et al.
Published: (2007)
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Efficient and fast multi layer statistical approach for colour based image retrieval
by: Odeh, , JQ, et al.
Published: (2003)
by: Odeh, , JQ, et al.
Published: (2003)
Statistical-based SYN-flooding detection using programmable network processor
by: Lim, , BP, et al.
Published: (2005)
by: Lim, , BP, et al.
Published: (2005)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
Statistical Fusion Approach on Keystroke Dynamics
by: Teh, Pin Shen, et al.
Published: (2007)
by: Teh, Pin Shen, et al.
Published: (2007)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
English-Malay Cross-Lingual Emotion Detection In Tweets Using Word Embedding Alignment
by: Lim, Ying Hao
Published: (2023)
by: Lim, Ying Hao
Published: (2023)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
Pixel-Based Parallel-Coordinates Technique For Outlier Detection In Cardiac Patient Dataset.
by: Hasimah, H.M., et al.
Published: (2007)
by: Hasimah, H.M., et al.
Published: (2007)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Quality Of Service Enabled Cross-Layer Multicast Framework For Mobile Ad Hoc Networks.
by: Mohammed Saghir, Mohammed
Published: (2008)
by: Mohammed Saghir, Mohammed
Published: (2008)
Using ensemble and learning techniques towards extending the knowledge Discovery Pipeline.
by: Yu, N Cheah, et al.
Published: (2002)
by: Yu, N Cheah, et al.
Published: (2002)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Statistical Analysis of Video Frame Size Distribution
Originating from Scalable Video Codec (SVC)
by: Ahmadpour, Sima, et al.
Published: (2017)
by: Ahmadpour, Sima, et al.
Published: (2017)
Enhanced Statistical Modelling For Variable Bit Rate Video Traffic Generated From Scalable Video Codec
by: Ahmadpour, Sima
Published: (2016)
by: Ahmadpour, Sima
Published: (2016)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Similarity-Based Weights For
Cross-Domain Sentiment Classification Of Product Reviews
by: Gupta, Aditi
Published: (2023)
by: Gupta, Aditi
Published: (2023)
Enhancement of optical images using hybrid edge detection technique
by: Sim, K. S., et al.
Published: (2009)
by: Sim, K. S., et al.
Published: (2009)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
A Framework Of High Mobility Routing For Video Transmission In Vehicular Ad Hoc Networks Using Relative Speed And Distance
by: Mohammed Yousef, Walid Shaher
Published: (2017)
by: Mohammed Yousef, Walid Shaher
Published: (2017)
Multimodal Semantics Integration Using Ontologies Enhanced By Ontology Extraction And Cross Modality Disambiguation
by: Shareha, Ahmad Adel Ahmad Abu
Published: (2012)
by: Shareha, Ahmad Adel Ahmad Abu
Published: (2012)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
A Feature Selection Approach for Network Intrusion Detection
by: Khor, Kok-Chin, et al.
Published: (2009)
by: Khor, Kok-Chin, et al.
Published: (2009)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
Towards dispersion relations for tapered core dielectric elliptical fibers
by: CHOUDHURY, P, et al.
Published: (2007)
by: CHOUDHURY, P, et al.
Published: (2007)
Automated Fish Detection And Identification
by: Wong , Poh Lee
Published: (2015)
by: Wong , Poh Lee
Published: (2015)
Design and implementation of a power quality disturbance classifier: An Al approach
by: Reaz, , M. B. I, et al.
Published: (2006)
by: Reaz, , M. B. I, et al.
Published: (2006)
Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
A Distributed Resource-Management Approach in MANETs
by: B., Pahlevanzadeh, et al.
Published: (2008)
by: B., Pahlevanzadeh, et al.
Published: (2008)
Latex glove protein detection using maximum-minimum clustering variation technique
by: Ting, Huong Yong, et al.
Published: (2009)
by: Ting, Huong Yong, et al.
Published: (2009)
Similar Items
-
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007) -
High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer.
by: Budiarto, Rahmat, et al.
Published: (2007) -
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007) -
Efficient and fast multi layer statistical approach for colour based image retrieval
by: Odeh, , JQ, et al.
Published: (2003) -
Statistical-based SYN-flooding detection using programmable network processor
by: Lim, , BP, et al.
Published: (2005)