Spyware Detection Techniques
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 2
Abstract
Computer viruses are big threat to computer world; researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining, system call arrangement and CFG analysis are some latest research activities in this field. The computability theory and the semi computable functions are quite important in our context of analyzing malicious activities. A mathematical model like random access stored program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses use more efficient techniques for their evolution so it is required to use strong models for understanding their evolution and then apply detection followed by the process of removal. Code Emulation is one of the strongest ways to analyze computer viruses but the anti-emulation activities made by virus designers are also active. This paper involves the study of spywares.
Authors and Affiliations
Ankur Singh Bist
Two Dimensional Mathematical Model of Contamination Distribution in the Lower Reach of Diyala River
One of rivers that suffer from the effect of pollutants is Diyala River, due to the untreated effluents from Rustimiyah wastewater treatment plant (WWTP) and from other contaminants sources such as Army Canal Outf...
PERFORMANCE COMPARISON OF REED-SOLOMON CODE USING M-ARY PSK AND FSK MODULATION IN AWGN CHANNEL
The main aim of this paper is to analyze the Bit error rate (BER) performance of Reed Solomon code (RSC) using Mary PSK and FSK modulation techniques in the presence of noisy channel i.e. (Additive White Gaussian...
Memory Debug Technique Using March17N BIST
A Memory Debug Technique plays a key role in System-on-chip (SOC) product development and yield ramp-up. Diagnosis technique plays a key role during the rapid development of the semiconductor memories, for Catchi...
BIO-HYDROGEN PRODUCTION IN MICROBIAL ELECTROLYSIS CELL USING WASTE WATER FROM SUGAR INDUSTRY
Majority of energy is derived from fossil fuels, which are non-sustainable resources that may exhaust in near future. Urge to decrease the dependence on fossil fuels and increasing demand of energy by the society...
SECURITY FEATURES IN INDIAN 500 RUPEE NOTE
Various security features of Indian 500 rupee note are discussed in this paper. Common man, who is using currency and having lack of knowledge about security features, can be cheated easily by forgers. There are more tha...