Kashipara.com is a community of ONE million programmers and students, Just like you, Helping each other.Join them. It only takes a minute: Sign Up
Job Resume TemplateTransformer-Based Malware Detection Using Process Resource Utilization Metrics project features and function requirement. Share Python Project ideas and topics with us. Grate and many Python project ideas and topics . Here some Python project ideas for research paper. Here large collection of Python project with source code and database. We many idea to development application like mobile application,desktop software application,web application development. You can find more project topics and ideas on Python. Development ideas on Transformer-Based Malware Detection Using Process Resource Utilization Metrics. You can find Top Downloaded Python projects here. Many project available to download with Python source code and database. Free download Transformer-Based Malware Detection Using Process Resource Utilization Metrics project synopsis available.
Free download Transformer-Based Malware Detection Using Process Resource Utilization Metrics mini and major Python project source code. Download simple learning Python project source code with diagram and documentations. More project with source code related to latest Python projects here.
| Publish by | Ram Singh |
| Project Name | Transformer-Based Malware Detection Using Process Resource Utilization Metrics |
| Upload Date | February 3, 2026 |
| Platform | Python |
| Programming Language | Python, JavaScript, HTML, CSS |
| Database | MongoDB |
| Front end | React.js, CSS, Bootstrap, Framer Motion |
| Back end | Python (Flask / FastAPI), Node.js (Express.js) |
| Project Type | web Application |
| View | 216 |
This project proposes a web-based malware detection system developed using the MERN stack with a Python-based machine learning backend. The frontend is built using React.js to provide an interactive and responsive user interface, while the backend services are handled using Node.js and Python. The system analyzes process resource utilization metrics such as CPU usage, memory consumption, disk activity, and runtime behavior to detect malicious software. A Transformer-based deep learning model is used to learn temporal patterns in system behavior and accurately classify malware and benign applications. The application includes secure authentication, file upload functionality, real-time analysis dashboards, and detailed malware detection reports, making it effective for detecting modern and zero-day malware threats
The User Module includes a secure Login Page that allows users to register, log in, log out, and manage their passwords. After successful login, users can access the malware detection dashboard, upload files or datasets for analysis, and submit them for scanning. The system displays results such as malware or benign status, confidence score, and risk level. Users can also view detailed analysis reports, track previous scan history, and interact with visual dashboards. This module ensures secure access, smooth user experience, and effective interaction with the malware detection system.
The system requires an operating system such as Windows, Linux, or macOS for development and execution. The frontend is developed using React.js with HTML, CSS, Bootstrap, and JavaScript. Backend services require Python with Flask or FastAPI for machine learning model integration and Node.js with Express.js for API handling. MongoDB is used as the database for storing user information and scan history. Additional software includes Python libraries such as NumPy, Pandas, PyTorch, and psutil, along with a modern web browser like Google Chrome or Firefox.
The system requires a computer with a minimum Intel i5 or equivalent processor to handle malware analysis tasks efficiently. At least 8 GB RAM is recommended for smooth execution of machine learning models and backend services. A minimum of 50 GB free disk space is required for storing datasets, logs, and application files. Stable internet connectivity is needed for web access and updates. Optional GPU support can improve model training performance but is not mandatory for deployment.
Query any SQLite database using plain English with no SQL knowledge required. The agent automatically discovers the schema, translates plain English questions into SQL queries, executes them and returns human readable answers. Includes auto repair for broken queries. Features include automatic schema discovery, natural language to SQL conversion ... [ Download Source Code ]
A document summarization pipeline capable of handling texts of any length using map-reduce strategy. Long documents are split into chunks, each chunk is summarized independently then all summaries are combined into a final output. Works on books, reports and transcripts. Features include three summary modes Brief, Detailed and Bullet Points, map ... [ Download Source Code ]
An autonomous AI agent that searches the live web in real time to answer any question. Uses the ReAct framework where the agent thinks about what to search, performs the search, observes the results and repeats until confident answer is found. Features include live web search via Tavily API, multi-step ReAct reasoning loop, transparent step by s ... [ Download Source Code ]
Upload any PDF and ask natural language questions about it using Retrieval-Augmented Generation. The program splits the PDF into chunks, embeds them into a FAISS vector store, and retrieves the most relevant sections to answer each question accurately. Key features include PDF ingestion and smart chunking, semantic search via FAISS vector store, ... [ Download Source Code ]
A conversational chatbot built with LangChain and GPT-4o that remembers the full session history. Users type any question and receive intelligent context-aware replies. The bot uses ConversationBufferMemory to retain all previous messages. Features include persistent conversation memory, GPT-4o integration, custom system prompt, clean CLI interf ... [ Download Source Code ]