Search Results - (( code application mining algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- application mining »
- code application »
- mining algorithm »
- java application »
-
1
-
2
-
3
-
4
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
5
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
10
An enhanced android botnet detection approach using feature refinement
Published 2019“…Static analysis examines the application code thoroughly, dynamic analysis examines the behaviours of the botware applications, while hybrid analysis is the combination of both of these analyses. …”
Get full text
Get full text
Thesis -
11
