scholarly journals A Survey on Malware detection using ML

Author(s):  
Prof. Pritam Ahire

Abstract: This Malware detection is a field of computer security that deals with the study and prevention of malicious software. It is not the only way to defend a company against a cyber- attack. In order to be effective, companies should analyse their risk and identify the vulnerabilities. In this paper, we will examine different techniques used to detect computer malware and malicious websites as well as future directives in this area of study and also, we will discuss the growth in computer malware and how traditional methods of detection are being replaced by innovative techniques like behavioural-based model and Signature-based model. Future directives involve developing better security products in order to fight against cyber fraud which is on a rise in recent years especially in Asia Pacific region. With this increase in cyber frauds and other malicious activities, traditional methods are not enough to block computers from it as this method has many drawbacks. In order to tackle these issues, researchers have been developing new techniques such as heuristic analysis, static & dynamic analysis which can detect more than 90% of malware samples without any false positives or negatives. Keywords: Behaviour-based approach, Dynamic analysis, Heuristic, Malware, Ransomware, Signature-based model, Static analysis, Vulnerability.

2021 ◽  
Vol 7 (8) ◽  
pp. 132
Author(s):  
Giorgio Margaritondo ◽  
Yeukuang Hwu

The high longitudinal and lateral coherence of synchrotron X-rays sources radically transformed radiography. Before them, the image contrast was almost only based on absorption. Coherent synchrotron sources transformed radiography into a multi-faceted tool that can extract information also from “phase” effects. Here, we report a very simple description of the new techniques, presenting them to potential new users without requiring a sophisticated background in advanced physics. We then illustrate the impact of such techniques with a number of examples. Finally, we present the international collaboration SYNAPSE (Synchrotrons for Neuroscience—an Asia-Pacific Strategic Enterprise), which targets the use of phase-contrast radiography to map one full human brain in a few years.


2013 ◽  
Vol 2013 ◽  
pp. 1-6 ◽  
Author(s):  
Orhan Bozkurt ◽  
Mehmet İslamoğlu

As the variety of materials utilized in construction industry has expanded, new techniques have been used in order to optimize the quality and efficiency of output. Therefore, recent innovations taking place in the construction industry led researchers to increase the mechanical efficiency of the output more than the cost effectiveness of it. However, especially professionals experiencing in the industry look into the cost effectiveness of the work. In other words, they also want researchers to justify the innovative techniques economically. The aim of this study is to provide a comparative analysis of the cost efficiency of polymer concrete used to manufacture durable and long-lasting reinforced concrete structures.


Author(s):  
Troy J. Strader ◽  
Daniel M. Norris ◽  
Philip A. Houle ◽  
Charles B. Shrader

This chapter examines an entrepreneurial effort to provide products in the Internet security marketplace. The specific focus is on a company named Palisade Systems, which is now faced with questions regarding their future business direction in this field (Mahanti et al., 2004). Current questions include how to take advantage of recent legislation regarding privacy and computer security, and the general increase in awareness of the need for security in the Internet and in related networks. In this chapter we discuss the Internet security marketplace, recent legislation and the creation of new opportunities for marketing Internet security products, and how Palisade’s products may match these opportunities.


2017 ◽  
Vol 11 (3) ◽  
pp. 15-28 ◽  
Author(s):  
Anjali Kumawat ◽  
Anil Kumar Sharma ◽  
Sunita Kumawat

Android based Smartphones are nowadays getting more popular. While using Smartphone, user is always concerned about security and malicious attacks, cryptographic vulnerability of the applications. With increase in the number of Android mobiles, Android malwares are also increasing very rapidly. So the authors have proposed the “Identification of cryptographic vulnerability and malware detection in Android” system. They have designed a user friendly android application, through which user and developer can easily test the application whether it is benign or vulnerable. The application will be tested firstly using static analysis and then the dynamic analysis will be carried out. The authors have implemented static and dynamic analysis of android application for vulnerable and malicious app detection. They have also created a web page. User can either use the application or the web page.


2006 ◽  
Vol 46 (1) ◽  
pp. 475
Author(s):  
J.D. Philips ◽  
V.E. Mathewson

Traditional methods of equity capital raising by listed companies may not always be the best way to meet the needs of both the companies and shareholders1. The timetable for a rights issue (being a pro rata offer to all shareholders to subscribe for shares) may be too long to fund an acquisition or project. A placement (being an offer to institutional investors for a certain number of shares), while giving a company certainty and a shorter timeframe, excludes the company's shareholders from participation in the capital raising.Innovative new capital raising structures have been developed. Two of these are known as the jumbo and the RAPIDs™ structures.Broadly, they both combine aspects of a rights offer and a placement. The rights offer is split into two stages; the first stage involves offering institutional investors on the company's share register their component of the rights offer, which can be done in a short timeframe. This institutional component of the rights offer is combined with a placement to other institutional investors through a bookbuild. The retail component of the rights offer is then conducted on the Australian Stock Exchange Limited's (ASX) normal (longer) timetable. The offer structures enable funds raised from the institutional rights offer and placement to be received quickly, while still enabling retail shareholders to participate in the offer and avoid dilution.


2014 ◽  
Vol 60 (2) ◽  
pp. 30-37 ◽  
Author(s):  
Remini Boualem ◽  
Achour Bachir ◽  
Kechad Rabah

Abstract This article discusses the traditional irrigation system in the oases of Touat, Gourara and Tidikelt. Since centuries, farmers use the system of foggaras for irrigation of palm groves and gardens. The results obtained following the inquiries and investigations carried out on the sites of foggaras, showed that since the eighties, drilling works multiplied in the oases of Touat, Gourara and Tidikelt. However, despite the application of these new techniques of water catchment, farmers still irrigate their gardens by traditional methods. For social, economic and environmental problems, foggaras degrade more and more; 50% of the foggaras decayed. Currently, the discharge of foggaras in service greatly diminished. The adoption of modern catchment techniques entails to the lowering of the water table.


Sign in / Sign up

Export Citation Format

Share Document