Skip to main content

Design of Robust Load Frequency Controller For a Hydrothermal Power System Using Q-parametrization Theory

Research Abstract
NULL
Research Authors
Ahmed Nabil A. Mohamed, Mohamed M. M. Hasan, and Abdelfatah M. Mohamed
Research Department
Research Journal
Journal of Engineering Sciences
Research Member
Research Pages
pp.643-660
Research Publisher
NULL
Research Rank
2
Research Vol
Vol. 31, No. 3
Research Website
NULL
Research Year
2003

Design of Robust Load Frequency Controller For a Hydrothermal Power System Using Q-parametrization Theory

Research Abstract
NULL
Research Authors
Ahmed Nabil A. Mohamed, Mohamed M. M. Hasan, and Abdelfatah M. Mohamed
Research Journal
Journal of Engineering Sciences
Research Pages
pp.643-660
Research Publisher
NULL
Research Rank
2
Research Vol
Vol. 31, No. 3
Research Website
NULL
Research Year
2003

Behavior-based features model for malware detection

Research Abstract
The sharing of malicious code libraries and techniques over the Internet has vastly increased the release of new malware variants in an unprecedented rate. Malware variants share similar behaviors yet they have different syntactic structure due to the incorporation of many obfuscation and code change techniques such as polymorphism and metamorphism. The different structure of malware variants poses a serious problem to signature-based detection technique, yet their similar exhibited behaviors and actions can be a remarkable feature to detect them by behavior-based techniques. Malware instances also largely depend on API calls provided by the operating system to achieve their malicious tasks. Therefore, behavior-based detection techniques that utilize API calls are promising for the detection of malware variants. In this paper, we propose a behavior-based features model that describes malicious action exhibited by malware instance. To extract the proposed model, we first perform dynamic analysis on a relatively recent malware dataset inside a controlled virtual environment and capture traces of API calls invoked by malware instances. The traces are then generalized into high-level features we refer to as actions. We assessed the viability of actions by various classification algorithms such as decision tree, random forests, and support vector machine. The experimental results demonstrate that the classifiers attain high accuracy and satisfactory results in the detection of malware variants.
Research Authors
Hisham Shehata Galal
Yousef Bassyouni Mahdy
Mohammed Ali Atiea
Research Department
Research Journal
Journal of computer virology and hacking techniques
Research Member
Mohamed Ali Attia Elsayed
Research Publisher
Springer
Research Rank
1
Research Website
http://link.springer.com/article/10.1007/s11416-015-0244-0
Research Year
2015

Behavior-based features model for malware detection

Research Abstract
The sharing of malicious code libraries and techniques over the Internet has vastly increased the release of new malware variants in an unprecedented rate. Malware variants share similar behaviors yet they have different syntactic structure due to the incorporation of many obfuscation and code change techniques such as polymorphism and metamorphism. The different structure of malware variants poses a serious problem to signature-based detection technique, yet their similar exhibited behaviors and actions can be a remarkable feature to detect them by behavior-based techniques. Malware instances also largely depend on API calls provided by the operating system to achieve their malicious tasks. Therefore, behavior-based detection techniques that utilize API calls are promising for the detection of malware variants. In this paper, we propose a behavior-based features model that describes malicious action exhibited by malware instance. To extract the proposed model, we first perform dynamic analysis on a relatively recent malware dataset inside a controlled virtual environment and capture traces of API calls invoked by malware instances. The traces are then generalized into high-level features we refer to as actions. We assessed the viability of actions by various classification algorithms such as decision tree, random forests, and support vector machine. The experimental results demonstrate that the classifiers attain high accuracy and satisfactory results in the detection of malware variants.
Research Authors
Hisham Shehata Galal
Yousef Bassyouni Mahdy
Mohammed Ali Atiea
Research Department
Research Journal
Journal of computer virology and hacking techniques
Research Publisher
Springer
Research Rank
1
Research Website
http://link.springer.com/article/10.1007/s11416-015-0244-0
Research Year
2015

Behavior-based features model for malware detection

Research Abstract
The sharing of malicious code libraries and techniques over the Internet has vastly increased the release of new malware variants in an unprecedented rate. Malware variants share similar behaviors yet they have different syntactic structure due to the incorporation of many obfuscation and code change techniques such as polymorphism and metamorphism. The different structure of malware variants poses a serious problem to signature-based detection technique, yet their similar exhibited behaviors and actions can be a remarkable feature to detect them by behavior-based techniques. Malware instances also largely depend on API calls provided by the operating system to achieve their malicious tasks. Therefore, behavior-based detection techniques that utilize API calls are promising for the detection of malware variants. In this paper, we propose a behavior-based features model that describes malicious action exhibited by malware instance. To extract the proposed model, we first perform dynamic analysis on a relatively recent malware dataset inside a controlled virtual environment and capture traces of API calls invoked by malware instances. The traces are then generalized into high-level features we refer to as actions. We assessed the viability of actions by various classification algorithms such as decision tree, random forests, and support vector machine. The experimental results demonstrate that the classifiers attain high accuracy and satisfactory results in the detection of malware variants.
Research Authors
Hisham Shehata Galal
Yousef Bassyouni Mahdy
Mohammed Ali Atiea
Research Department
Research Journal
Journal of computer virology and hacking techniques
Research Member
Research Publisher
Springer
Research Rank
1
Research Website
http://link.springer.com/article/10.1007/s11416-015-0244-0
Research Year
2015

Multifocus Image Fusion Using Local Phase Coherence Measurement

Research Authors
R.Hassen,Z.Wang,M.Salama
Research Department
Research Journal
International Conference of Image Analysis and Recognition (ICIAR)
Research Member
Research Pages
pp 54-63
Research Publisher
Springer Berlin Heidelberg
Research Rank
3
Research Vol
Volume: 5627
Research Website
https://www.aimiconf.org/
Research Year
2009

Multi-sensor Image Registration Based-on Local Phase Coherence

Research Authors
R. Hassen,Z. Wang,M. Salama
Research Department
Research Journal
IEEE International Conference of Image Processing (ICIP)
Research Member
Research Pages
pp 181-184
Research Publisher
IEEE
Research Rank
3
Research Website
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5403221
Research Year
2009
Subscribe to