Designing a new model for Trojan horse detection using sequential minimal optimization

Malwares attack such as by the worm, virus, trojan horse and botnet have caused lots of troublesome for many organisations and users which lead to the cybercrime. Living in a cyber world, being infected by these malwares becoming more common. Nowadays the malwares attack especially by the trojan hor...

Full description

Saved in:
Bibliographic Details
Main Authors: M.M., Saudi, A.M., Abuzaid, B.M., Taib, Z.H., Abdullah
Format: Conference Paper
Language:en_US
Published: Springer Verlag 2015
Subjects:
Online Access:http://ddms.usim.edu.my/handle/123456789/9177
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Sains Islam Malaysia
Language: en_US
Be the first to leave a comment!
You must be logged in first