Search Results - (( botnet detection learning algorithm ) OR ( java implementation path algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1
  2. 2

    Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis by Akash, Nazmus Sakib, Rouf, Shakir, Jahan, Sigma, Chowdhury, Amlan, Uddin, Jia

    Published 2022
    “…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. …”
    Get full text
    Get full text
    Article
  3. 3

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
    Proceedings Paper
  4. 4
  5. 5
  6. 6

    A Static Approach towards Mobile Botnet Detection by Shahid, Anwar, Jasni, Mohamad Zain, Inayat, Zakira, Ul Haq, Riaz, Ahmad, Karim, Jaber, Aws Naser

    Published 2016
    “…In this study we propose a static approach towards mobile botnet detection. This technique combines MD5, permissions, broadcast receivers as well as background services and uses machine learning algorithm to detect those applications that have capabilities for mobile botnets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A smart framework for mobile botnet detection using static analysis by Anwar, Shahid, Mohamad Fadli, Zolkipli, Mezhuyev, Vitaliy, Inayat, Zakira

    Published 2020
    “…This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…In order to detect botnet attacks which causes immense chaos and problems to smartphones, first the Android botnet need to be analysed. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization by Saudi, MM, Abuzaid, AM, Taib, BM, Abdullah, ZH

    Published 2024
    “…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
    Proceedings Paper
  11. 11
  12. 12

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Secure IIoT-enabled industry 4.0 by Zeeshan Hussain, Adnan Akhunzada, Javed Iqbal, Iram Bibi, Abdullah Gani

    Published 2021
    “…IIoT-enabled botnets are highly scalable, technologically diverse, and highly resilient to classical and conventional detection mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning by Thrupthi, C.P., Chitra, K., Harilakshmi, V.M.

    Published 2024
    “…Machine learning algorithms have been proposed to identify bot networks with a focus on extracting features from high-dimensional datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Android mobile malware detection model based on permission features using machine learning approach by Sharfah Ratibah, Tuan Mat

    Published 2022
    “…Both samples of datasets then were evaluated using machine learning and deep learning approaches to analyse the best accuracy of malware detection. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis