Malicious Portable Executable Static Scoring method using Evidence Combinational Theory with Fuzzy Hashing
dc.contributor.author | Namanya, Anitta Patience | |
dc.date.accessioned | 2023-05-05T17:18:01Z | |
dc.date.available | 2023-05-05T17:18:01Z | |
dc.date.issued | 2017 | |
dc.description.abstract | Malware detection and prevention systems are bypassed by malicious files in computer networks as malware become more complex and vast in number. This work introduces and investigates how different hashing results can be combined to achieve better detection rates. Two evidence combination theory based methods are applied in this work in order propose a novel way of combining the results achieved from different hashing algorithms. Our results show that the detection rates are improved when evidence combination techniques are applied. | en_US |
dc.identifier.citation | Namanya, A. P. Malicious Portable Executable Static Scoring method using Evidence Combinational Theory with Fuzzy Hashing. | en_US |
dc.identifier.uri | https://womencourage.acm.org/archive/2016/poster_abstracts/womENcourage_2016_paper_21.pdf | |
dc.identifier.uri | https://nru.uncst.go.ug/handle/123456789/8636 | |
dc.language.iso | en | en_US |
dc.publisher | Electrical Engineering and Computer Science | en_US |
dc.subject | Malware Static Analysis | en_US |
dc.subject | Malware detection | en_US |
dc.subject | Evidence combinational theory | en_US |
dc.subject | Fuzzy hashing | en_US |
dc.subject | PE files | en_US |
dc.title | Malicious Portable Executable Static Scoring method using Evidence Combinational Theory with Fuzzy Hashing | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Malicious Portable Executable Static Scoring method using.pdf
- Size:
- 918.23 KB
- Format:
- Adobe Portable Document Format
- Description:
- Article
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: