Search Results - (( based constructive path algorithm ) OR ( security classification learning algorithm ))
Search alternatives:
- security classification »
- classification learning »
- based constructive »
- learning algorithm »
- constructive path »
- path algorithm »
-
1
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…The best phishing classification features and machine learning technique are identified in order to produce and generate a classification model. …”
Get full text
Get full text
Thesis -
2
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024Subjects:Article -
3
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…The IDS with machine learning method improves the detection accuracy of the security attacks. …”
Get full text
Get full text
Get full text
Article -
4
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
5
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
6
-
7
-
8
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024Proceedings Paper -
9
A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments
Published 2013“…The motion planning problem poses the question of how a robot can move from an initial to a final position. Sampling-based motion planning is a class of randomized path planning algorithms with proven completeness. …”
Get full text
Get full text
Thesis -
10
Autonomous path planning robot using geographical information
Published 2008Get full text
Learning Object -
11
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…This study was solely concerned with the Windows malware dataset. The malware classification was determined by testing and training the supervised ML algorithms using the extracted features from the malware dataset. …”
Get full text
Get full text
Get full text
Article -
12
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
Get full text
Thesis -
13
A novel framework for identifying twitter spam data using machine learning algorithms
Published 2020“…The research results contribute significantly to the field of cyber-security by forming a real-time system using machine learning algorithms.…”
Get full text
Get full text
Get full text
Article -
14
-
15
BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning
Published 2023“…Android (operating system); Android malware; Classification (of information); Feature Selection; Learning systems; Mobile security; Android apps; Classification models; Feature weight; Features selection; Machine learning algorithms; Machine-learning; Malware detection; Malwares; Memory usage; Selection techniques; Learning algorithms…”
Article -
16
Maldroid- attribute selection analysis for malware classification
Published 2019“…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article -
17
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…Finally, the performances of both algorithms were analyzed and evaluated based on the required criteria. …”
Get full text
Get full text
Thesis -
18
-
19
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…A model-driven approach was used for generating abstract test cases from the feasible paths. This model driven approach was integrated with the proposed infeasible path detection method which based on analyzing various OCL constructs and operations. …”
Get full text
Get full text
Get full text
Thesis -
20
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
Get full text
Get full text
Thesis
