A framework of determining the malware factor of suspicious files based on its behaviours
Saved in:
| Main Author: | Nur Shamimi Che Anuar (Author) |
|---|---|
| Corporate Author: | Universiti Pertahanan Nasional Malaysia. Pusat Pengajian Siswazah |
| Format: | Thesis Book |
| Language: | English |
| Published: |
Kuala Lumpur
Universiti Pertahanan Nasional Malaysia
2015
|
| Series: | Thesis
Tesis |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Malware forensics field guide for Windows systems digital forensics field guides
by: Malin, Cameron H.
Published: (2012)
by: Malin, Cameron H.
Published: (2012)
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
by: Davis, Michael A.
Published: (2010)
by: Davis, Michael A.
Published: (2010)
Development of atrial fibrillation detection algorithm based on extracted ECG features and hybrid multilayer perceptron network
by: Muhamad Hadzren Mat
Published: (2019)
by: Muhamad Hadzren Mat
Published: (2019)
Data mining tools for malware detection
by: Masud, Mehedy
Published: (2012)
by: Masud, Mehedy
Published: (2012)
Predictive trend mining for social network analysis
by: Puteri N.E. Nohuddin
Published: (2012)
by: Puteri N.E. Nohuddin
Published: (2012)
Malware analyst's cookbook and DVD tools and techniques for fighting malicious code
by: Ligh, Michael Hale, et al.
Published: (2011)
by: Ligh, Michael Hale, et al.
Published: (2011)
Cybersecurity, botnets and cyberterrorism
by: Jacobson George V.
Published: (2009)
by: Jacobson George V.
Published: (2009)
Short course on computer virusus
by: Cohen lhFrederick B.
by: Cohen lhFrederick B.
Forensic examination of windows-supported file systems
by: Elrick, Doug
Published: (2016)
by: Elrick, Doug
Published: (2016)
Malware forensics field guide for Linux systems digital forensics field guides
by: Malin, Cameron H
Published: (2014)
by: Malin, Cameron H
Published: (2014)
Cybersecurity wellness index evaluation framework for critical organisations
by: Husin Jazri
Published: (2019)
by: Husin Jazri
Published: (2019)
Citizen-centric privacy requirements engineering framework
by: Nor Asiakin Hasbullah
Published: (2017)
by: Nor Asiakin Hasbullah
Published: (2017)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
DETERMINING CRITICAL SUCCESS FACTORS OF INFORMATION SECURITY KNOWLEDGE TOWARDS ORGANISATIONS' INFORMATION SECURITY EFFECTIVENESS : /
by: Rohana Mohamad Rashid
Published: (2020)
by: Rohana Mohamad Rashid
Published: (2020)
ENHANCING CENTRALISED CYBERSECURITY FOR CAMPUS NETWORK INFRASTRUCTURE USING LOG CONSOLIDATION PROCESSING FRAMEWORK BASED ON SIEM /
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory
by: Ligh, Michael Hale, et al.
Published: (2014)
by: Ligh, Michael Hale, et al.
Published: (2014)
Security for the digital world within an ethical framework
Published: (2016)
Published: (2016)
Understanding viruses
by: Shors, Teri
Published: (2009)
by: Shors, Teri
Published: (2009)
A cyber exercise post assessment framework in Malaysia perspective
by: Arniyati Ahmad
Published: (2016)
by: Arniyati Ahmad
Published: (2016)
Wireshark for security professionals using Wireshark and the Metasploit Framework
by: Bullock, Jessey, et al.
Published: (2017)
by: Bullock, Jessey, et al.
Published: (2017)
Fields virology
Published: (2007)
Published: (2007)
Network attacks and exploitation a framework
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Security frameworks in contemporary electronic government
Published: (2019)
Published: (2019)
Securing systems applied security architecture and threat models
by: Schoenfield, Brook S. E.
Published: (2015)
by: Schoenfield, Brook S. E.
Published: (2015)
Endpoint Security
by: Kadrich
Published: (2007)
by: Kadrich
Published: (2007)
Protecting your PC
by: Barile, Ian
Published: (2006)
by: Barile, Ian
Published: (2006)
Information security a practical approach
by: Bhaskar
Published: (2008)
by: Bhaskar
Published: (2008)
How to cheat at securing your network
Published: (2007)
Published: (2007)
Guide to network defense and countermeasures
by: Weaver
Published: (2007)
by: Weaver
Published: (2007)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020)
by: Easttom, Chuck
Published: (2020)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Computer Security Fundamentals /
by: Easttom, Chuck
Published: (2023)
by: Easttom, Chuck
Published: (2023)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Googling security : how much does Google know about you? /
by: Conti, Greg
Published: (2009)
by: Conti, Greg
Published: (2009)
Network security essentials applications and standards
by: Stallings, William
Published: (2007)
by: Stallings, William
Published: (2007)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Similar Items
-
Malware forensics field guide for Windows systems digital forensics field guides
by: Malin, Cameron H.
Published: (2012) -
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
by: Davis, Michael A.
Published: (2010) -
Development of atrial fibrillation detection algorithm based on extracted ECG features and hybrid multilayer perceptron network
by: Muhamad Hadzren Mat
Published: (2019) -
Data mining tools for malware detection
by: Masud, Mehedy
Published: (2012) -
Predictive trend mining for social network analysis
by: Puteri N.E. Nohuddin
Published: (2012)