Please use this identifier to cite or link to this item: http://192.168.98.239:8080/jspui/handle/1994/1770
Full metadata record
DC FieldValueLanguage
dc.date.accessioned2024-10-29T05:55:39Z-
dc.date.available2024-10-29T05:55:39Z-
dc.date.issued2024-
dc.identifier.urihttp://192.168.98.239:8080/jspui/handle/1994/1770-
dc.description.abstractAvailable.en_US
dc.format.extentxx, 225 p.en_US
dc.language.isoenen_US
dc.publisherTezpur Universityen_US
dc.subjectDeep Learningen_US
dc.subjectDetectionen_US
dc.subjectEnsembleen_US
dc.subjectGraph Neural Networken_US
dc.subjectHoneyneten_US
dc.subjectMalwareen_US
dc.subjectMarkov Chainen_US
dc.titleDetection of Malware and Malware-based Attacks using AI Approachesen_US
dc.typeThesisen_US
dc.contributor.guideBhattacharyya, Dhruba Kumar-
dc.contributor.guideKalita, Jugal-
dc.creator.researcherBorah, Parthajit-
dc.departmentDepartment of Computer Science and Engineeringen_US
Appears in Collections:Theses

Files in This Item:
File Description SizeFormat 
01_title.pdf130.02 kBAdobe PDFView/Open
02_prelim pages.pdf409.21 kBAdobe PDFView/Open
03_content.pdf83.93 kBAdobe PDFView/Open
04_abstract.pdf53.38 kBAdobe PDFView/Open
05_chapter 1.pdf293.08 kBAdobe PDFView/Open
06_chapter 2.pdf1.25 MBAdobe PDFView/Open
07_chapter 3.pdf1.21 MBAdobe PDFView/Open
08_chapter 4.pdf2.55 MBAdobe PDFView/Open
09_chapter 5.pdf1.15 MBAdobe PDFView/Open
10_chapter 6.pdf454.82 kBAdobe PDFView/Open
11_chapter 7.pdf1.94 MBAdobe PDFView/Open
12_chapter 8.pdf1.59 MBAdobe PDFView/Open
13_chapter 9.pdf1.6 MBAdobe PDFView/Open
14_chapter 10.pdf91.9 kBAdobe PDFView/Open
80_recommendation.pdf220.77 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.