Search Results - (( code application mining algorithm ) OR ( java application matching algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…Static analysis examines the application code thoroughly, dynamic analysis examines the behaviours of the botware applications, while hybrid analysis is the combination of both of these analyses. …”
    Get full text
    Get full text
    Thesis
  11. 11