Advanced Trace Pattern For Computer Intrusion Discovery
The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research...
| Main Authors: | Selamat, S. R., Yusof, R., Sahib, S., Mas'ud, Z., Abdollah, M. F., Zainal Abidin, Z. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Journal of Computing
2010
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/78/ http://eprints.utem.edu.my/id/eprint/78/1/1006.4569%5B1%5D.pdf |
Similar Items
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
Intrusion Alert Correlation Technique Analysis for Heterogeneous Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Generic Taxonomy of Social Engineering Attack
by: Mohd Foozy, F, et al.
Published: (2011)
by: Mohd Foozy, F, et al.
Published: (2011)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Cpu Usage Pattern Discovery
Using Suffix Tree For Computational
Resource Advisory System
by: Ooi, Boon Yaik
Published: (2006)
by: Ooi, Boon Yaik
Published: (2006)
Enhanced intrusion detection capabilities via weighted chi-square, discretization and SVM
by: Mohamed Yassin, Warusia, et al.
Published: (2018)
by: Mohamed Yassin, Warusia, et al.
Published: (2018)
Network Administration & Management
by: Yusof, R., et al.
Published: (2007)
by: Yusof, R., et al.
Published: (2007)
Virtual Machine based Autonomous Web Server
by: Mas’ud, M. Z., et al.
Published: (2011)
by: Mas’ud, M. Z., et al.
Published: (2011)
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
Fast discovery of long patterns for association rules
by: Mustapha, N., et al.
Published: (2003)
by: Mustapha, N., et al.
Published: (2003)
Intelligent responses through network-based answer discovery with advanced reasoning
by: Wong, Wilson, et al.
Published: (2005)
by: Wong, Wilson, et al.
Published: (2005)
Patterns of Advanced Computer Applications in Singapore
by: Han, Chun Kwong
Published: (1983)
by: Han, Chun Kwong
Published: (1983)
Mapping Process of Digital Forensic Investigation Framework
by: Selamat, S. R., et al.
Published: (2008)
by: Selamat, S. R., et al.
Published: (2008)
Tracing low-mass galaxy clusters using radio relics: The discovery of Abell 3527-bis
by: De Gasperin, F., et al.
Published: (2017)
by: De Gasperin, F., et al.
Published: (2017)
Classification and pattern discovery of mood in weblogs
by: Nguyen, Thin, et al.
Published: (2010)
by: Nguyen, Thin, et al.
Published: (2010)
Factors affecting treatment seeking patterns amongst public in three selected areas in Kuantan: discovery of perceptions (dzan) among community as thought in Islam
by: Mat Yusof, Afzan, et al.
Published: (2018)
by: Mat Yusof, Afzan, et al.
Published: (2018)
Effects of petroleum fiscal regimes and tax instruments on the investment climate of marginal oil fields in Malaysia
by: Mas'ud, Abdulsalam
Published: (2016)
by: Mas'ud, Abdulsalam
Published: (2016)
Multiresolution Ray Tracing For
Point-Based Geometry
by: Zakaria, Mohamed Nordin
Published: (2007)
by: Zakaria, Mohamed Nordin
Published: (2007)
Performance Enhancements in IEEE 802.11 DCF MANET through Variation of SIFS Values in Distance Vector Routing Environment
by: Md Khambari, M. N., et al.
Published: (2011)
by: Md Khambari, M. N., et al.
Published: (2011)
Intrusion Alert Quality Framework For
Security False Alert Reduction
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
State of the art intrusion detection system for cloud computing
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
Hybrid Computational Intelligence Models With Symbolic Rule Extraction For Pattern Classification
by: Quteishat, Anas Mohammad Ali
Published: (2008)
by: Quteishat, Anas Mohammad Ali
Published: (2008)
Tracing the Environmental Effects of Mineral Fertilizer Application with Trace Elements and Strontium Isotope Variations
by: Hill, R.C., et al.
Published: (2024)
by: Hill, R.C., et al.
Published: (2024)
Discovery of saffron trace as an inhibitor for the destructive effect of green verdigris (copper based pigment) in Persian miniature paintings
by: Barkeshli, Mandana
Published: (2010)
by: Barkeshli, Mandana
Published: (2010)
Similar Items
-
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010) -
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010) -
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009) -
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010) -
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)