{"created":"2020-09-01T15:14:58.568000+00:00","id":4663,"links":{},"metadata":{"_buckets":{"deposit":"ae5ff1f5-9958-4233-91cd-4c71370bbbb1"},"_deposit":{"id":"4663","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4663"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4663","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Hybrid Framework for Integrated Malware Analysis to Detect Advanced Persistent Threat","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"The term Advanced Persistent Threat (APT)is used as a replacement term for cyber warfareand malware has developed into the majorvehicle for APT. Malware analysis and detectionis a major resource in maintaining anorganization’s antivirus preparedness andresponsiveness by contributing to the well-beingof its IT health, and consequently to that of theeconomy as a whole. There is a need to developan automatic malware detection andclassification system to identify the variants ofmalware, in order to guide analysts in theselection of samples that require the mostattention. In this paper, we introduce HybridFramework for our ongoing research, IntegratedMalware Analysis to Detect Advanced PersistentThreat (APT). In our framework we integratedthe static and dynamic malware analysis as wellas K-mean clustering and Bayesianclassification approaches."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Malware Analysis"},{"interim":"Malware"},{"interim":"Malware Classification"},{"interim":"Malware Clustering"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"201643.pdf","filesize":[{"value":"132 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4663/files/201643.pdf"},"version_id":"c091920e-3760-42ac-a425-4a625d28f68a"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourteenth International Conference On Computer Applications (ICCA 2016)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Thwin, Thein Than"},{"subitem_authors_fullname":"Thwin, Mie Mie Su"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2016-02-25"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/318"},"item_title":"Hybrid Framework for Integrated Malware Analysis to Detect Advanced Persistent Threat","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"4663","relation_version_is_last":true,"title":["Hybrid Framework for Integrated Malware Analysis to Detect Advanced Persistent Threat"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:12:52.550070+00:00"}