Malicious Portable Executable Static Scoring method using Evidence Combinational Theory with Fuzzy Hashing

dc.contributor.authorNamanya, Anitta Patience
dc.date.accessioned2023-05-05T17:18:01Z
dc.date.available2023-05-05T17:18:01Z
dc.date.issued2017
dc.description.abstractMalware detection and prevention systems are bypassed by malicious files in computer networks as malware become more complex and vast in number. This work introduces and investigates how different hashing results can be combined to achieve better detection rates. Two evidence combination theory based methods are applied in this work in order propose a novel way of combining the results achieved from different hashing algorithms. Our results show that the detection rates are improved when evidence combination techniques are applied.en_US
dc.identifier.citationNamanya, A. P. Malicious Portable Executable Static Scoring method using Evidence Combinational Theory with Fuzzy Hashing.en_US
dc.identifier.urihttps://womencourage.acm.org/archive/2016/poster_abstracts/womENcourage_2016_paper_21.pdf
dc.identifier.urihttps://nru.uncst.go.ug/handle/123456789/8636
dc.language.isoenen_US
dc.publisherElectrical Engineering and Computer Scienceen_US
dc.subjectMalware Static Analysisen_US
dc.subjectMalware detectionen_US
dc.subjectEvidence combinational theoryen_US
dc.subjectFuzzy hashingen_US
dc.subjectPE filesen_US
dc.titleMalicious Portable Executable Static Scoring method using Evidence Combinational Theory with Fuzzy Hashingen_US
dc.typeArticleen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Malicious Portable Executable Static Scoring method using.pdf
Size:
918.23 KB
Format:
Adobe Portable Document Format
Description:
Article
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: