Search Results - (( based malware optimization algorithm ) OR ( java pattern classification algorithm ))
Search alternatives:
- pattern classification »
- malware optimization »
- based malware »
- java »
-
1
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…Several machine learning techniques based on supervised learning have been applied to classify malware. …”
Get full text
Get full text
Get full text
Article -
2
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…Particle swarm optimization (PSO) is used to optimize the random generation of candidate detectors and parameters associated with apriori algorithm (AA) for features selection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…Several machine learning techniques based on supervised learning have been adopted in the classification of malware. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
5
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…During the training and optimization process, these base learners adopt a hybrid BP and Particle Swarm Optimization algorithm to combine both local and global optimization capabilities for identifying optimal features and improving the classification performance. …”
Get full text
Get full text
Get full text
Article -
6
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
7
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…The lack of RGB image-based malware datasets hampers the performance of existing deep learning (DL) models, which require large datasets for high accuracy and face challenges such as time-consuming hyperparameter optimization. …”
thesis::doctoral thesis -
8
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…The result shows that the detection of malware within application category achieves higher accuracy compared to application with non-category based. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
-
10
-
11
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
12
-
13
Integrating Information Gain and Chi-Square for Enhanced Malware Detection Performance
Published 2025“…As malware has progressed from its simpler, monomorphic variants to more sophisticated forms like oligomorphic, polymorphic, and metamorphic, a machine learning-based detection system is now required, surpassing the limitations of traditional signature-based methods. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
16
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…At the end of the process, the system will utilise this model to detect cryptojacking and users will be able to detect new cryptojacking malware based on the model. This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
Get full text
Get full text
Undergraduates Project Papers -
17
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…The bio-inspired algorithm: particle swarm optimization (PSO) is used to optimized URLs features. …”
Get full text
Get full text
Get full text
Article -
18
A New Model for Trojan Detection using Machine Learning Inspired by Al-Furqan Verse
Published 2024“…Moreover, the knowledge discovery techniques (KDD) and the data mining algorithm were used to optimize the accuracy result. …”
Article
