Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
The shift from the manual approach of processing data to the digitized method has made organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent threat that has ravaged many industries and governments. APT causes enormous damages for data loss, e...
| Main Author: | Ali Mohamed, Nachaat Abdelatif |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2022
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/59238/ http://eprints.usm.my/59238/1/24%20Pages%20from%20NACHAAT%20ABDELATIF%20ALI%20MOHAMED%20-%20TESIS.pdf |
Similar Items
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Rule Generation Based On Structural Clustering For Automatic Question Answering
by: Song , Shen
Published: (2009)
by: Song , Shen
Published: (2009)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Rule Learning and Extraction Using a Hybrid Neural Network: A Case Study on Fault Detection and Diagnosis
by: Tan, Shing Chiang, et al.
Published: (2005)
by: Tan, Shing Chiang, et al.
Published: (2005)
Advisory Aided System To Institute Of Higher Learning Based On Rules Based And Personality Assessment.
by: Osman, Mohd Azam, et al.
Published: (2007)
by: Osman, Mohd Azam, et al.
Published: (2007)
Analysis on spatial and temporal features of gait kinematics
by: Wan Noorshahida Mohd Isa,
Published: (2005)
by: Wan Noorshahida Mohd Isa,
Published: (2005)
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)
by: TEOH, A, et al.
Published: (2005)
Feature Estraction In Automatic Shape Recognition System.
by: Salam, Rosalina Abdul, et al.
Published: (2004)
by: Salam, Rosalina Abdul, et al.
Published: (2004)
Recent Advances in Transport Level Error Control Techniques for Wireless Video Transmission
by: Yoong Choon, Chang, et al.
Published: (2009)
by: Yoong Choon, Chang, et al.
Published: (2009)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Comparison of Different Feature Extraction Techniques in Content-Based Image Retrieval for CT Brain Images
by: Wan Ahmad, Wan Siti Halimatul Munirah, et al.
Published: (2008)
by: Wan Ahmad, Wan Siti Halimatul Munirah, et al.
Published: (2008)
Neural network classification of late gamma band electroencephalogram features
by: Ravi, K. V. R., et al.
Published: (2006)
by: Ravi, K. V. R., et al.
Published: (2006)
Color Feature Embedded for Content-based Image Retrieval System.
by: Sumari, Putra, et al.
by: Sumari, Putra, et al.
Analysis Of Feature Reduction Algorithms To Estimate
Human Stress Conditions
by: Arasu, Darshan Babu
Published: (2022)
by: Arasu, Darshan Babu
Published: (2022)
CCS525 – Advanced Cloud Computing Platform June 2019
CCS521 – Advanced Distributed Systems Concepts & Design June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
CCS515- ADVANCED KNOWLEDGE MANAGEMENT JANUARY 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
CCS592 – Advanced Algorithms and Complexity June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CCS592 – Advanced Algorithms & Complexity June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005)
by: Yap, , TS, et al.
Published: (2005)
A Feature Selection Approach for Network Intrusion Detection
by: Khor, Kok-Chin, et al.
Published: (2009)
by: Khor, Kok-Chin, et al.
Published: (2009)
Texture Features Selection for Masses Detection In Digital Mammogram
by: A. M., Khuzi, et al.
Published: (2008)
by: A. M., Khuzi, et al.
Published: (2008)
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
Medical Image Modality Classification using Feature Weighted Clustering Approach.
by: Chandra, Bhavik Anil
Published: (2010)
by: Chandra, Bhavik Anil
Published: (2010)
Feature Selection And Enhanced Krill Herd Algorithm For Text Document Clustering
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
CCS592 - ADVANCED ALGORITHMS & COMPLEXITY APR-MAY 2011
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2011)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2011)
CST433 – Advanced Computer Organisation & Architecture June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CST433 - Advanced computer organisation & Architecture June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
by: PPSKOM, Pusat Pengajian Sains Komputer
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
by: Jin, , ATB, et al.
Published: (2004)
by: Jin, , ATB, et al.
Published: (2004)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Digitising Dictionaries For Advanced Look-Up And Lexical Knowledge Research In Malay.
by: Lim, Lian Tze, et al.
Published: (2007)
by: Lim, Lian Tze, et al.
Published: (2007)
CCS521 – ADVANCED DISTRIBUTED SYSTEMS CONCEPTS & DESIGN NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CCS522 – ADVANCED DATA COMMUNICATION AND COMPUTER NETWORKS NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CCS 522 - ADVANCED DATA COMMUNICATION AND COMPUTER NETWORKS NOV 2008
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CCS521 - ADVANCED DISTRIBUTED SYSTEMS COMCEPTS AND DESIGN JANUARY 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
CCS522- ADVANCED DATA COMMUNICATION AND COMPUTER NETWORKS JANUARY 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
Similar Items
-
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018) -
Rule Generation Based On Structural Clustering For Automatic Question Answering
by: Song , Shen
Published: (2009) -
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019) -
Rule Learning and Extraction Using a Hybrid Neural Network: A Case Study on Fault Detection and Diagnosis
by: Tan, Shing Chiang, et al.
Published: (2005) -
Advisory Aided System To Institute Of Higher Learning Based On Rules Based And Personality Assessment.
by: Osman, Mohd Azam, et al.
Published: (2007)