Search Results - (( based cyber classification algorithm ) OR ( java evolution optimization algorithm ))
Search alternatives:
- evolution optimization »
- cyber classification »
- java »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…The aim of this evolution is to reflect the unseen time overhead incurred by optimal real-time algorithm, represented by LRE-TL, which might hinder the claimed optimality of such algorithms when they are practically implemented. …”
Get full text
Get full text
Conference or Workshop Item -
2
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
3
Metaheuristic based ids using multi-objective wrapper feature selection and neural network classification
Published 2021“…This article proposes a cyber-intrusion detecting system classification with MLP trained by a hybrid metaheuristic algorithm and feature selection based on multi-objective wrapper method. …”
Get full text
Get full text
Conference or Workshop Item -
4
Energy-efficient intrusion detection in wireless sensor network
Published 2012Get full text
Get full text
Conference or Workshop Item -
5
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
6
-
7
Anomaly detection in ICS datasets with machine learning algorithms
Published 2021“…The machine learning algorithms have been performed with labeled output for prediction classification. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…Studies have shown how user perception can have a strong influence on policies and decision-making processes in a place, society, and nation. This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
9
Cyber parental control framework for objectionable web content classification and filtering based on topic modelling using enhanced latent dirichlet allocation / Hamza H. M. Altart...
Published 2023“…This problem has motivated academia and industry to develop frameworks for cyber parental control. Despite substantial advancements in automating web classification that combines web mining and content classification methods, the study identifies a gap in applying advanced machine learning algorithms for superior objectionable web content classification. …”
Get full text
Get full text
Get full text
Thesis -
10
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
Published 2019“…Mitigation techniques such as honeypot simulation which helps in vulnerability assessment, along with machine learning algorithms, suitable for intrusion detection and prevention of cyber-attacks in SCADA systems has been detailed.…”
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…The optimized DBN algorithm, known as the HW-DBN algorithm, integrated through feature learning based on a Gaussian–Bernoulli Restricted Boltzmann Machine as well as classification task through a weight neuron network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
An integrated model to email spam classification using an enhanced grasshopper optimization algorithm to train a multilayer perceptron neural network
Published 2021Get full text
Get full text
Conference or Workshop Item -
15
Spam classification based on supervised learning using grasshopper optimization algorithm and artificial neural network
Published 2021Get full text
Get full text
Conference or Workshop Item -
16
A novel framework for identifying twitter spam data using machine learning algorithms
Published 2020“…The research results contribute significantly to the field of cyber-security by forming a real-time system using machine learning algorithms.…”
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Published 2024Article -
20
A New Model for Trojan Detection using Machine Learning Inspired by Al-Furqan Verse
Published 2024Article
