Now you can Instantly Chat with Zeeshan!
About Me
IT security specialist with a passion and talent for aligning security architecture, plans, controls, processes, policies and procedures with security standards and operational goals. Project leader with proven experience directing all phases of comp... standards and operational goals. Project leader with proven experience directing all phases of complex projects while managing, motivating and mentoring global team members. Extensive experience developing and testing security architectures of cloud-based systems.
Show MorePortfolio Projects
Description
Malicious software - so called malware - poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffective, such that millions of hosts in the Internet are infected with malware in the form of computer viruses, Internet worms and Trojan horses. While obfuscation and polymorphism employed by malware largely impede detection at file level, the dynamic analysis of malware binaries during run-time provides an instrument for characterizing and defending against the threat of malicious software.iwe propose a framework for the automatic analysis of malware behavior using machine learning. The framework allows for automatically identifying novel classes of malware with similar behavior (clustering) and assigning unknown malware to these discovered classes (classification). Based on both, clustering and classification, we propose an incremental approach for behavior-based analysis, capable of processing the behavior of thousands of malware binaries on a daily basis. The incremental analysis significantly reduces the run-time overhead of current analysis methods, while providing accurate discovery and discrimination of novel malware variants.
Show More Show LessDescription
It was a web based system thatfacilitates managing the functioning of the hospital or any medical set up.
Thissystem or software will help in making the whole functioning paperless. Itintegrates all the information regarding patients, doctors, staff, hospitaladministrative details etc. into one software. It has sections for variousprofessionals that make up a hospital.
Show More Show LessDescription
Twitteris a gold mine of data. Unlike other social platforms, almost every user’s tweets are completely public and pullable. This is a huge plus if you’re trying to get a large amount of data to run analytics on. Twitter data is also pretty specific. Twitter’s API allows you to do complex queries like pulling every tweet about a certain topic within the last twenty minutes or pull a certain user’s non-retweeted tweets.
Show More Show LessDescription
The purpose of apen testis to identify vulnerabilities in your application exploitable from an outside attacker.Penetration testingcan beperformedagainst the various types of code and systems used in your application, such as APIs and servers.
Tools I have used and configured is as Follows .
Show More Show LessVerifications
-
Profile Verified
-
Phone Verified
Preferred Language
-
English - Fluent
-
Hindi - Conversational
-
Arabic - Basic
Available Timezones
BROWSE SIMILAR DEVELOPER
-
Chris M
Expert Full-Stack Developer
-
Sriraman C
R&D Centre head, Head - Delivery head , Product management, Agile Specialist, Embedded , CTO
-
Roy M
Highly experienced global IT professional w/ extensive experience on Management & Project Management
-
Art F
Data Architect with Teradata, Linux, SQL, and Python experience
-
James M
• Infrastructure Management/Project Mangement
-
RICHARD V
Electronics Circuit Design Engineer
-
Fred L
Executive Consultant
-
Jeffrey L
Cisco Network and Voice Engineer with heavy Linux / C / PHP / Python programming background
-
Venkat R
DELIVERY HEAD & ADVISER TO CMD
-
Olaf C
Senior AI, Cognitive & Automation Architect Azure/Quantum Hybrid Architect