Zobrazeno 1 - 10
of 74
pro vyhledávání: '"Masrom, Maslin"'
Autor:
Qi Ling1 qiling@graduate.utm.my, Masrom, Maslin Bte1 maslin.kl@utm.my
Publikováno v:
International Journal of Professional Business Review (JPBReview). 2023, Vol. 8 Issue 6, p1-16. 16p.
Publikováno v:
Interactive Learning Environments; Sep2024, Vol. 32 Issue 7, p3546-3565, 20p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
International Journal of Web Information Systems, 2020, Vol. 17, Issue 1, pp. 18-28.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJWIS-08-2020-0050
Publikováno v:
AIP Conference Proceedings; 3/26/2024, Vol. 2927 Issue 1, p1-6, 6p
Publikováno v:
In Computers & Education December 2019 142
Autor:
Wan Zakaria, Wan Normeza, Abas, Hafiza, Masrom, Maslin, Mohdali, Raihana, Nik Mohamed, Nik Nadzirah
Publikováno v:
TEM Journal. 8(3):908-914
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=791100
Autor:
Rad, Babak Bashari, Masrom, Maslin
Metamorphic viruses engage different mutation techniques to escape from string signature based scanning. They try to change their code in new offspring so that the variants appear non-similar and have no common sequences of string as signature. Howev
Externí odkaz:
http://arxiv.org/abs/1104.3229
Autor:
Rad, Babak Bashari, Masrom, Maslin
Publikováno v:
Rad, B. B. and Masrom, M. (2010). Metamorphic Virus Variants Classification Using Opcode Frequency Histogram. Proceedings of the 14th WSEAS International Conference on COMPUTERS. July 23-25, 2010. Corfu Island, Greece, pp. 147-155
In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus software, metamorphic viruses use several various obfuscation approaches. They transform their code in new instances as look entirely
Externí odkaz:
http://arxiv.org/abs/1104.3228
Publikováno v:
International Journal of Computer Science Issues (IJCSI), Vol. 8, No. 1, 2011, pp. 113-121
This paper presents a general overview on evolution of concealment methods in computer viruses and defensive techniques employed by anti-virus products. In order to stay far from the anti-virus scanners, computer viruses gradually improve their codes
Externí odkaz:
http://arxiv.org/abs/1104.1070