Search Results - (( botnet detection learning algorithm ) OR ( java implementation based algorithm ))
Search alternatives:
- implementation based »
- java implementation »
- detection learning »
- learning algorithm »
-
1
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
2
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. …”
Get full text
Get full text
Article -
3
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
4
-
5
-
6
A Static Approach towards Mobile Botnet Detection
Published 2016“…In this study we propose a static approach towards mobile botnet detection. This technique combines MD5, permissions, broadcast receivers as well as background services and uses machine learning algorithm to detect those applications that have capabilities for mobile botnets. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A smart framework for mobile botnet detection using static analysis
Published 2020“…This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. …”
Get full text
Get full text
Get full text
Article -
8
An enhanced android botnet detection approach using feature refinement
Published 2019“…In order to detect botnet attacks which causes immense chaos and problems to smartphones, first the Android botnet need to be analysed. …”
Get full text
Get full text
Thesis -
9
-
10
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
11
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
12
Secure IIoT-enabled industry 4.0
Published 2021“…IIoT-enabled botnets are highly scalable, technologically diverse, and highly resilient to classical and conventional detection mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
14
Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning
Published 2024“…Machine learning algorithms have been proposed to identify bot networks with a focus on extracting features from high-dimensional datasets. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
16
Android mobile malware detection model based on permission features using machine learning approach
Published 2022“…Both samples of datasets then were evaluated using machine learning and deep learning approaches to analyse the best accuracy of malware detection. …”
Get full text
Get full text
Thesis -
17
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
18
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
19
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
20
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers
