Assembly Language Analysis for Identification of Malicious Codes
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 1
Abstract
in the direction of classification and detection of these viruses. Gr some latest research activities in this field. The computability theory and the semi computable computable functions are quite important in our context of analyzing malicious activity. A mathematical model like rando program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses have more efficient techniques for their evolution so it is required to use strong models to understand their evolution and then apply detection followed by the process of removal. Cod
Authors and Affiliations
Ankur Singh Bist
A Hybrid Technique for Image Retrieval Using Canny and Neural Network
Today image retrieval is big area of research. Specially, over internet it is widely used. Edge Detection plays an important role to detect edges. An edge of the object /Image can be used to define the shape and structu...
HERMOSOLUTAL CONVECTION IN A HETEROGENEOUS VISCO-ELASTIC (OLDROYDIAN) FLUID LAYER IN A POROUS MEDIUM
The paper critically examines, within the framework of linear stability analysis, the thermosolutal convection in a heterogeneous visco-elastic (Oldroydian) fluid layer in a porous medium. In the present paper, st...
Computer Science and E
Ethics justifies about the status of task whether it is correct or not , with this it includes the factor of social adoption i .e. what we do . This paper involves the review study of various ethics themes like computer...
UNDER DISTORTED GRID VOLTAGE DIRECT POWER CONTROL OF DOUBLY FED INDUCTION GENERATOR
This paper presents a direct power control strategy for a doubly fed induction generator based wind power By analyzing the six times grid frequency power pulsation produced by the fifth and seventh grid voltag...
A Technical Review on Web Application Security Vulnerabilities
The web is an indispensable part of our lives. Every retrieve information and communicate over the web. Although the web is convenient for many users because it provides anytime, anywhere access to information an...