Search Results - (( botnet detection learning algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- detection learning »
- learning algorithm »
- application mining »
- java application »
- mining algorithm »
-
1
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
2
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. …”
Get full text
Get full text
Article -
3
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
4
-
5
-
6
A Static Approach towards Mobile Botnet Detection
Published 2016“…In this study we propose a static approach towards mobile botnet detection. This technique combines MD5, permissions, broadcast receivers as well as background services and uses machine learning algorithm to detect those applications that have capabilities for mobile botnets. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A smart framework for mobile botnet detection using static analysis
Published 2020“…This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. …”
Get full text
Get full text
Get full text
Article -
8
An enhanced android botnet detection approach using feature refinement
Published 2019“…In order to detect botnet attacks which causes immense chaos and problems to smartphones, first the Android botnet need to be analysed. …”
Get full text
Get full text
Thesis -
9
-
10
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
13
-
14
Secure IIoT-enabled industry 4.0
Published 2021“…IIoT-enabled botnets are highly scalable, technologically diverse, and highly resilient to classical and conventional detection mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning
Published 2024“…Machine learning algorithms have been proposed to identify bot networks with a focus on extracting features from high-dimensional datasets. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Android mobile malware detection model based on permission features using machine learning approach
Published 2022“…Both samples of datasets then were evaluated using machine learning and deep learning approaches to analyse the best accuracy of malware detection. …”
Get full text
Get full text
Thesis -
17
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
18
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal
