A New Model for Trojan Detection using Machine Learning Inspired by Al-Furqan Verse
Living in a cyber-world, it is becoming very common for users to receive lots of emails with different files attachment. Sometimes some of the files might contain malicious file. It is not an easy job to differentiate between benign and malicious file in the email attachment without the help of the...
Saved in:
Main Authors: | Mohd Saudi, Madihah, Abuzaid, Areej Mustafa |
---|---|
Format: | Article |
Language: | en_US |
Published: |
Universiti Sains Islam Malaysia
2016
|
Subjects: | |
Online Access: | http://ddms.usim.edu.my/handle/123456789/9821 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Designing a new model to detect Trojan Horse based on knowledge discovery and data mining
by: Areej Mustafa Khlaif Abuzaid
Published: (2015) -
Designing a new model for Trojan horse detection using sequential minimal optimization
by: M.M., Saudi, et al.
Published: (2015) -
EDOWA worm classification
by: Madihah, Mohd Saudi,, et al.
Published: (2015) -
Reverse engineering: EDOWA worm analysis and classification
by: M.M., Saudi, et al.
Published: (2015) -
Trojan horse of Canakkale
by: Onn, Lau Tai, Ir.
Published: (2020)