Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "ae5ff1f5-9958-4233-91cd-4c71370bbbb1"}, "_deposit": {"id": "4663", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4663"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4663", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Hybrid Framework for Integrated Malware Analysis to Detect Advanced Persistent Threat", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The term Advanced Persistent Threat (APT)is used as a replacement term for cyber warfareand malware has developed into the majorvehicle for APT. Malware analysis and detectionis a major resource in maintaining anorganization’s antivirus preparedness andresponsiveness by contributing to the well-beingof its IT health, and consequently to that of theeconomy as a whole. There is a need to developan automatic malware detection andclassification system to identify the variants ofmalware, in order to guide analysts in theselection of samples that require the mostattention. In this paper, we introduce HybridFramework for our ongoing research, IntegratedMalware Analysis to Detect Advanced PersistentThreat (APT). In our framework we integratedthe static and dynamic malware analysis as wellas K-mean clustering and Bayesianclassification approaches."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Malware Analysis"}, {"interim": "Malware"}, {"interim": "Malware Classification"}, {"interim": "Malware Clustering"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "201643.pdf", "filesize": [{"value": "132 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 132000.0, "url": {"url": "https://meral.edu.mm/record/4663/files/201643.pdf"}, "version_id": "c091920e-3760-42ac-a425-4a625d28f68a"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourteenth International Conference On Computer Applications (ICCA 2016)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thwin, Thein Than"}, {"subitem_authors_fullname": "Thwin, Mie Mie Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-02-25"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/318"}, "item_title": "Hybrid Framework for Integrated Malware Analysis to Detect Advanced Persistent Threat", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004663", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4663", "relation": {}, "relation_version_is_last": true, "title": ["Hybrid Framework for Integrated Malware Analysis to Detect Advanced Persistent Threat"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Hybrid Framework for Integrated Malware Analysis to Detect Advanced Persistent Threat

http://hdl.handle.net/20.500.12678/0000004663
http://hdl.handle.net/20.500.12678/0000004663
f676f876-0d72-4899-8182-6ddb4223185c
ae5ff1f5-9958-4233-91cd-4c71370bbbb1
None
Preview
Name / File License Actions
201643.pdf 201643.pdf (132 Kb)
Publication type
Article
Upload type
Publication
Title
Title Hybrid Framework for Integrated Malware Analysis to Detect Advanced Persistent Threat
Language en
Publication date 2016-02-25
Authors
Thwin, Thein Than
Thwin, Mie Mie Su
Description
The term Advanced Persistent Threat (APT)is used as a replacement term for cyber warfareand malware has developed into the majorvehicle for APT. Malware analysis and detectionis a major resource in maintaining anorganization’s antivirus preparedness andresponsiveness by contributing to the well-beingof its IT health, and consequently to that of theeconomy as a whole. There is a need to developan automatic malware detection andclassification system to identify the variants ofmalware, in order to guide analysts in theselection of samples that require the mostattention. In this paper, we introduce HybridFramework for our ongoing research, IntegratedMalware Analysis to Detect Advanced PersistentThreat (APT). In our framework we integratedthe static and dynamic malware analysis as wellas K-mean clustering and Bayesianclassification approaches.
Keywords
Malware Analysis, Malware, Malware Classification, Malware Clustering
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/318
Journal articles
Fourteenth International Conference On Computer Applications (ICCA 2016)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:15:00.185237
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL