Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/16356
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSINGH, AMIT-
dc.date.accessioned2019-09-04T06:24:51Z-
dc.date.available2019-09-04T06:24:51Z-
dc.date.issued2018-06-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/16356-
dc.description.abstractMalicious programming is bounteous in a universe of endless PC clients, who are always looked with these dangers from different sources like the web, nearby systems and versatile drives. Malware is possibly low to high hazard and can make frameworks work erroneously, take information and even crash. Malware might be executable or framework library records as infections, worms, Trojans, all went for rupturing the security of the framework and bargaining client protection. Commonly, hostile to infection programming depends on a mark definition framework which continues refreshing from the web and in this manner monitoring known infections. While this might be adequate for home-clients, a security hazard from another infection could undermine a whole undertaking system. we propose using dynamic machine learning algorithms for higher accuracy in detection with minimum false positive ratio.en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD-4248;-
dc.subjectMALWARE DETECTIONen_US
dc.subjectCLIENT PROTECTIONen_US
dc.subjectDYNAMIC MACHINE LEARNING METHODOLOGYen_US
dc.titleMALWARE DETECTION USING DYNAMIC MACHINE LEARNING METHODOLOGYen_US
dc.typeThesisen_US
Appears in Collections:M.E./M.Tech. Information Technology

Files in This Item:
File Description SizeFormat 
MALWARE DETECTION USING DYNAMIC MACHINE LEARNING METHODOLOGY.pdf1.22 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.