The Performance Analysis of Malware Attack
People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are...
Main Authors: | Nur Khairani Kamarudin, Nur Nazifa Md Hasani, Rafiza Ruslan, Rashidah Ramle, Nurul Hidayah Ahmad Zukri, Iman Hazwam Abd Halim |
---|---|
Format: | Article |
Language: | English |
Published: |
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Perlis
2018-11-01
|
Series: | Journal of Computing Research and Innovation |
Subjects: | |
Online Access: | https://jcrinn.com/index.php/jcrinn/article/view/72 |
Similar Items
-
Performance Analysis of Malware Attack
by: Nur Khairani Kamarudin, et al.
Published: (2018-11-01) -
Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review
by: Sanjay Madan, et al.
Published: (2022-11-01) -
IP Telephony Server Emulation for Monitoring and Analysis of Malicious Activity in VOIP Network
by: Jakub Safarik, et al.
Published: (2013-07-01) -
Reducing Honeypot Log Storage Capacity Consumption – Cron Job with Perl-Script Approach
by: Iman Hazwam Bin Abd Halim, et al.
Published: (2019-11-01) -
Hfinger: Malware HTTP Request Fingerprinting
by: Piotr Białczak, et al.
Published: (2021-04-01)