Spyware Detection Techniques

Abstract

 Computer viruses are big threat to computer world; researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining, system call arrangement and CFG analysis are some latest research activities in this field. The computability theory and the semi computable functions are quite important in our context of analyzing malicious activities. A mathematical model like random access stored program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses use more efficient techniques for their evolution so it is required to use strong models for understanding their evolution and then apply detection followed by the process of removal. Code Emulation is one of the strongest ways to analyze computer viruses but the anti-emulation activities made by virus designers are also active. This paper involves the study of spywares.

Authors and Affiliations

Ankur Singh Bist

Keywords

Related Articles

On Regular Difilters in Ditopological Texture Spaces

The focus of this paper is to introduce the new spaces namely - door spaces, - irreducible,-Hyperconnectedness which are used to define Regular difilters in di- topological texture spaces. Here we analyze the proper...

 DIGITAL GENERIC DATA COMPRESSION ALGORITHMS USING MATLAB

 Generic data compression algorithms is an area of digital processing that is focusing on reducing bit rate of the speech signal for transmission or storage without significant loss of quality. The focus of this pa...

 A MODEL FOR DEFINING THE RETAILER’S PROFIT BASED ON LOAD SHIFTING AND TOU PRICING

 Deregulation of the electricity market is an important issue in the energy sector. A major aim of deregulation is to increase competition among electricity retailers/suppliers and thereby enrich consumer choic...

 Monitoring of Geological CO2, based on Wireless Sensor Networks

 Carbon Capture and Storage (CCS), also known as Carbon Capture and Sequestration, includes geological storage CO2. Safe, long-term geological storage (sequestration) of CO2 also requires a continuous monitoring sy...

 Urbanization & Urban Land-Use Mapping Using Remote Sensing & GIS

 A study on “Urbanization & Urban Land-use mapping” was carried out using IRS Satellite data of LISS III and LISS IV covering Gandhinagar city. The GIS data like the Transport Network, Urban Habitation, Bridge...

Download PDF file
  • EP ID EP122511
  • DOI -
  • Views 83
  • Downloads 0

How To Cite

Ankur Singh Bist (30).  Spyware Detection Techniques. International Journal of Engineering Sciences & Research Technology, 3(2), 780-782. https://www.europub.co.uk/articles/-A-122511