Zobrazeno 1 - 10
of 561
pro vyhledávání: '"Faizal, M"'
Autor:
Rafrastara, Fauzi Adi, A, Faizal M.
This research proposed an architecture and a system which able to monitor the virus behavior and classify them as a traditional or polymorphic virus. Preliminary research was conducted to get the current virus behavior and to find the certain paramet
Externí odkaz:
http://arxiv.org/abs/2009.06630
Autor:
Nasruddin, Setianto, W B, Lanjar, Atmaji, P, Manalu, L P, Wulandari, E P, Sari, T I, Faizal, M, Ibrahim, B
Publikováno v:
IOP Conference Series: Earth & Environmental Science; 2024, Vol. 1358 Issue 1, p1-11, 11p
Autor:
Sripadmanabhan Indira, Sridhar, Vaithilingam, Chockalingam Aravind, Chong, Kok-Keong, Saidur, R., Faizal, M., Abubakar, Shamsu, Paiman, Suriati
Publikováno v:
In Solar Energy 1 May 2020 201:122-148
Publikováno v:
In Materials Today: Proceedings 2020 22 Part 4:2412-2423
Autor:
Basri, Ernnie I., Sultan, Mohamed T.H., Faizal, M., Basri, Adi A., Abas, Mohd. F., Majid, M.S. Abdul, Mandeep, J.S., Ahmad, Kamarul A.
Publikováno v:
In Journal of Materials Research and Technology September-October 2019 8(5):3822-3834
Publikováno v:
Journal of Computing, Vol. 2, No. 6, June 2010, NY, USA, ISSN 2151-9617
The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain t
Externí odkaz:
http://arxiv.org/abs/1006.4569
Publikováno v:
International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 1-9, January 2010, USA
The number of malware variants is growing tremendously and the study of malware attacks on the Internet is still a demanding research domain. In this research, various logs from different OSI layer are explore to identify the traces leave on the atta
Externí odkaz:
http://arxiv.org/abs/1002.1678
Publikováno v:
Journal of Computing, Vol. 2, Issue 1, January 2010
The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack
Externí odkaz:
http://arxiv.org/abs/1001.3477
Publikováno v:
Robiah Y, Siti Rahayu S., Mohd Zaki M, Shahrin S., Faizal M. A., Marliza R., International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 56-61, September 2009, USA
Malware is a type of malicious program that replicate from host machine and propagate through network. It has been considered as one type of computer attack and intrusion that can do a variety of malicious activity on a computer. This paper addresses
Externí odkaz:
http://arxiv.org/abs/0909.4860
Publikováno v:
International Journal of Computer Science and Information Security, IJCSIS, Volume 4, No. 1, August 2009, USA
Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Interne
Externí odkaz:
http://arxiv.org/abs/0908.3587