Formulating Generalize Malware Attack Pattern Using Features Selection
Malicious software or malware activity is increasingly threatened the network security as the malicious codes can be easily obtained and can be used as a weapon to gain illegal objectives. Hence, network traffic gathered from a control experiment are explored and features selection method is used t...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Asian Research Publishing Network (ARPN)
2016
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/16990/2/robiah.pdf http://eprints.utem.edu.my/id/eprint/16990/ http://www.arpnjournals.org/jeas/research_papers/rp_2016/jeas_0316_3819.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|