分層 區間二型模糊 知識本體模型 之  複合惡意程式行為分析 系統
A Hierarchical IT2FO Model for Hybrid Malware Behavior Analysis System
MAN in Taiwan
Developer & C

opyrighted by

 : TonTon Hsien-De Huang
Welcome to contact us (TonTon@TWMAN.ORG) if you are interested in collaborating with us.
 FaceBook: http://X.TWMAN.ORG/Facebook / Community on Google+:http://X.TWMAN.ORG/Community
SourceForge: http://X.TWMAN.ORG/SourceForge 
Please use the following references
or our publications to cite: 
  • H. D. Huang, C. S. Lee, M. H. Wang, and H. Y. Kao, "IT2FS-based ontology with soft-computing mechanism for malware behavior analysis," Soft Computing, vol. 18, no. 2, pp. 267-284, 2014. 
  • H. D. Huang, C. S. Lee, M. H. Wang, and H. Y. Kao, "IT2FLS-based Malware Analysis Mechanism: Malware Analysis Network in Taiwan (MiT)" in Proceeding of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013), Manchester, United-Kingdom, Oct. 13-16, 2013.
Install / Setup User Guide: 請務必先撥空讀過下面說明及中英文網誌
English version please visit:http://MiT.TWMAN.ORG/mit/user-guide


This project is open source and distributed under the
Please feel free to add to or modify this source, propose changes, new converters and reference this website.

The Developer who would like to thanks Mr. Jazz Yao-Tsung Wang, Mr. Figaro Chen-Ho Yang
Dept. Computer Science and Information Engineering (CSIE) in National Cheng-Kung University (NCKU), Dept. Information and Learning Technology (ILT), National University of Tainan (Taiwan), and Acer e-Enabling Data Center (Acer eDC)  for their kindly supporting this Research Project.
If you interesting the hidden meaning of the MiT logo, please click logo.

Importance Reminder
New project (2012.12.12~) for malware behavioral analysis and identify which named MiT and focus as follow:

(1.) Applying Interval Type-2 Fuzzy Ontology  model for malware behavioral 
.
(2.)
Applying Data Mining and Social Network approach to malware behavior identify.
(3.) 
Integrate
 DRBL with KVM to be a
Heterogeneous
 (
V
irtual/Physical) 
Architecture (include x86, ARM )
.
(4.) 
Release a Free Cloud Drive for Share malicious sample and analyze report.
Ċ
TonTon Hsien-De Huang,
2013年7月1日 上午10:20