Please use this identifier to cite or link to this item: http://ddms.usim.edu.my:80/jspui/handle/123456789/9243
Full metadata record
DC FieldValueLanguage
dc.contributor.authorM.M., Saudi,-
dc.contributor.authorA.J., Cullen,-
dc.contributor.authorM.E., Woodward,-
dc.date.accessioned2015-08-26T03:58:05Z-
dc.date.available2015-08-26T03:58:05Z-
dc.date.issued2010-
dc.identifier.isbn9789-8817-0129-9-
dc.identifier.urihttp://ddms.usim.edu.my/handle/123456789/9243-
dc.description.abstractThis paper presents the result of the statistical analysis on relationship between sub features in STAKCERT worm classification. The sub features of the STAKCERT worm classification in this paper were using the statistical analysis to prove the relationship between the sub features. Prior to that, the static and the dynamic analysis were conducted to identify and prove the association between the main features in STAKCERT worm classification for worm detection. There are limited ways on how the relationship between categorical data can be evaluated and Chi-Square tests and the symmetric measure are seen as the best method to be implemented. The case study presented in this paper explains in details how the Chi-Square tests are used to determine the relationship existed between the sub features and followed by the symmetric measure to quantify the strength of the relationship. This research paper is based on the integration between statistics and computer security field specifically with worm analysis. It can be used as the basis for further exploration in worm detection and isolation study.en_US
dc.language.isoen_USen_US
dc.subjectActivationen_US
dc.subjectChi-Squareen_US
dc.subjectInfectionen_US
dc.subjectPayloaden_US
dc.subjectSymmetric measureen_US
dc.titleStatistical analysis in evaluating STAKCERT infection, activation and payload methodsen_US
dc.typeConference Paperen_US
Appears in Collections:World Congress On Engineering 2008, Vols I-II

Files in This Item:
File Description SizeFormat 
Statistical analysis in evaluating STAKCERT infection, activation and payload methods.pdf179.3 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.