Survey on representation techniques for malware detection system
Malicious programs are malignant software’s designed by hackers or cyber offenders with a harmful intent to disrupt computer operation. In various researches, we found that the balance between designing an accurate architecture that can detect the malware and track several advanced techniques that m...
Saved in:
Main Authors: | Mohamed, Gamal Abdel Nassir, Ithnin, Norafida |
---|---|
Format: | Article |
Language: | English |
Published: |
Science Publications
2017
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/80729/1/NorafidaIthnin2017_SurveyonRepresentationTechniquesforMalwareDetection.pdf http://eprints.utm.my/id/eprint/80729/ https://dx.doi.org/10.3844/ajassp.2017.1049.1069 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Malware detection issues, challenges, and future directions: A survey
by: Aboaoja, Faitouri A., et al.
Published: (2022) -
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015) -
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019) -
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014) -
Challenges in high accuracy of malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)