Fatema Hamid - Academia.edu (original) (raw)

Related Authors

IJRASET Publication

Shubham Pawar

Aryan Sharma

Arpan Kumar

Tejas Phase

Armando Marques-Guedes

Lev Manovich

Lev Manovich

Graduate Center of the City University of New York

Isad Saric

Uploads

Papers by Fatema Hamid

Research paper thumbnail of Enhancing Malware Detection with Static Analysis using Machine Learning

International Journal for Research in Applied Science and Engineering Technology

As malware increases nowadays, it is necessary to safeguard your system from the malware. Malware... more As malware increases nowadays, it is necessary to safeguard your system from the malware. Malware is being protected by traditional methods but it only protects system from the malware whose signature is known. So we aim to prepare a software which detects the malware (signature is unknown) by the malware(signature is known) and after detecting the malware, steps must be taken to retrain the model and disallow the malware to compromise the system. For detecting the malware already known machine learning methods such as random forest classifier, multi view ensemble learning etc. will be used.

Research paper thumbnail of Enhancing Malware Detection with Static Analysis using Machine Learning

International Journal for Research in Applied Science and Engineering Technology

As malware increases nowadays, it is necessary to safeguard your system from the malware. Malware... more As malware increases nowadays, it is necessary to safeguard your system from the malware. Malware is being protected by traditional methods but it only protects system from the malware whose signature is known. So we aim to prepare a software which detects the malware (signature is unknown) by the malware(signature is known) and after detecting the malware, steps must be taken to retrain the model and disallow the malware to compromise the system. For detecting the malware already known machine learning methods such as random forest classifier, multi view ensemble learning etc. will be used.

Log In