Assembly Language Analysis for Identification of Malicious Codes
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 1
Abstract
in the direction of classification and detection of these viruses. Gr some latest research activities in this field. The computability theory and the semi computable computable functions are quite important in our context of analyzing malicious activity. A mathematical model like rando program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses have more efficient techniques for their evolution so it is required to use strong models to understand their evolution and then apply detection followed by the process of removal. Cod
Authors and Affiliations
Ankur Singh Bist
UNDERGROUND CABLE FAULT DISTANCE LOCATOR BY USING MICROCONTROLLER
This paper conclude that the underground cable fault location model by using microcontroller. The purpose of project is to identify the cable fault distance from initial position in terms of kilometer. By using simple m...
CLASSIFICATION OF EEG SIGNAL DATA USING HYBRID OF NEURO-FUZZY
Brain Computing interface technology represents a very highly growing field now-a-days for the research because of its unique applications system. In this paper we investigate classification methods of mental comm...
DIFFERENT METHODS FOR DG ANTI-ISLANDING PROTECTION
For better power quality and reliability, the power industry are focusing to distributed generations i.e. DG. New technology like photo voltaic (PV), fuel cell, wind turbine, and new innovation in power electronics gene...
Microcontroller Based Weather Data Logger
Data logger periodically measures various real-time meteorological parameters and stores for future use. The Microcontroller based automatic weather Data Logger is arranged that it can automatically operate unatte...
IMPLEMENTATION AND DESIGN THREE SOFTWARE USING REUSABLE SOFTWARE CONCEPT “ANALYTICAL STUDY”
There are two ways for the principle of re-use software and the first way is the indirect method indirect boils down to the use of one or more pieces of software in the production and creation of new programs witho...