Search Results - (( botnet detection learning algorithm ) OR ( java application using algorithm ))
Search alternatives:
- detection learning »
- learning algorithm »
- java application »
- using algorithm »
-
1
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
2
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. …”
Get full text
Get full text
Article -
3
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
4
-
5
-
6
A Static Approach towards Mobile Botnet Detection
Published 2016“…In this study we propose a static approach towards mobile botnet detection. This technique combines MD5, permissions, broadcast receivers as well as background services and uses machine learning algorithm to detect those applications that have capabilities for mobile botnets. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A smart framework for mobile botnet detection using static analysis
Published 2020“…This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. …”
Get full text
Get full text
Get full text
Article -
8
An enhanced android botnet detection approach using feature refinement
Published 2019“…In order to detect botnet attacks which causes immense chaos and problems to smartphones, first the Android botnet need to be analysed. …”
Get full text
Get full text
Thesis -
9
-
10
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
11
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
12
Secure IIoT-enabled industry 4.0
Published 2021“…IIoT-enabled botnets are highly scalable, technologically diverse, and highly resilient to classical and conventional detection mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning
Published 2024“…Machine learning algorithms have been proposed to identify bot networks with a focus on extracting features from high-dimensional datasets. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Android mobile malware detection model based on permission features using machine learning approach
Published 2022“…Both samples of datasets then were evaluated using machine learning and deep learning approaches to analyse the best accuracy of malware detection. …”
Get full text
Get full text
Thesis -
15
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
16
-
17
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
