A Three-Way Decision Making Approach to Malware Analysis

Author(s):  
Mohammad Nauman ◽  
Nouman Azam ◽  
JingTao Yao
2020 ◽  
Vol 13 (6) ◽  
pp. 94-109
Author(s):  
Rajeev Kumar ◽  
◽  
Mamdouh Alenezi ◽  
Md Ansari ◽  
Bineet Gupta ◽  
...  

Nowadays, most of the cyber-attacks are initiated by extremely malicious programs known as Malware. Malwares are very vigorous and can penetrate the security of information and communication systems. While there are different techniques available for malware analysis, it becomes challenging to select the most effective approach. In this context, the decision-making process may be an efficient means of empirically assessing the impact of different methods for securing the web applications. In this research study, we have used a methodology that includes the integration of Fuzzy AHP and Fuzzy TOPSIS technique for evaluating the impact of different malware analysis techniques in web application perspective. This study uses different versions of a university’s web application for evaluating the impact of several existing malware analysis techniques. The findings of the study show that the Reverse Engineering approach is the most efficient technique for analyzing complex malware. The outcome of this study would definitely aid the future researchers and developers in selecting the appropriate techniques for scanning the web application code and enhancing the security.


Author(s):  
Rajeev Kumar ◽  
Raees Ahmad Khan ◽  
Abhishek Kumar Pandey ◽  
Ashutosh Tripathi ◽  
Alka Agrawal

2016 ◽  
Vol 374 ◽  
pp. 193-209 ◽  
Author(s):  
Mohammad Nauman ◽  
Nouman Azam ◽  
JingTao Yao

2018 ◽  
Vol 41 ◽  
Author(s):  
Patrick Simen ◽  
Fuat Balcı

AbstractRahnev & Denison (R&D) argue against normative theories and in favor of a more descriptive “standard observer model” of perceptual decision making. We agree with the authors in many respects, but we argue that optimality (specifically, reward-rate maximization) has proved demonstrably useful as a hypothesis, contrary to the authors’ claims.


2018 ◽  
Vol 41 ◽  
Author(s):  
David Danks

AbstractThe target article uses a mathematical framework derived from Bayesian decision making to demonstrate suboptimal decision making but then attributes psychological reality to the framework components. Rahnev & Denison's (R&D) positive proposal thus risks ignoring plausible psychological theories that could implement complex perceptual decision making. We must be careful not to slide from success with an analytical tool to the reality of the tool components.


2018 ◽  
Vol 41 ◽  
Author(s):  
Kevin Arceneaux

AbstractIntuitions guide decision-making, and looking to the evolutionary history of humans illuminates why some behavioral responses are more intuitive than others. Yet a place remains for cognitive processes to second-guess intuitive responses – that is, to be reflective – and individual differences abound in automatic, intuitive processing as well.


2014 ◽  
Vol 38 (01) ◽  
pp. 46
Author(s):  
David R. Shanks ◽  
Ben R. Newell

2014 ◽  
Vol 38 (01) ◽  
pp. 48
Author(s):  
David R. Shanks ◽  
Ben R. Newell

2020 ◽  
Vol 43 ◽  
Author(s):  
Valerie F. Reyna ◽  
David A. Broniatowski

Abstract Gilead et al. offer a thoughtful and much-needed treatment of abstraction. However, it fails to build on an extensive literature on abstraction, representational diversity, neurocognition, and psychopathology that provides important constraints and alternative evidence-based conceptions. We draw on conceptions in software engineering, socio-technical systems engineering, and a neurocognitive theory with abstract representations of gist at its core, fuzzy-trace theory.


Sign in / Sign up

Export Citation Format

Share Document