Search Results - (( develop banking detection algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Detection and extraction features for signatures images via different techniques by Fatma Susilawati, M., Alsuhimat, F.M., Iqtait, M.

    Published 2019
    “…Three techniques have been applied using (UTSig) dataset; the results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Evaluating Machine Learning Algorithms for Fake Currency Detection by Keerthana, S.N, Chitra, K.

    Published 2024
    “…Our findings contribute to developing reliable, automated systems for counterfeit detection, and enhancing financial security…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection by Algriree, Waleed, Sulaiman, Nasri, Isa, Maryam, Sahbudin, Ratna K. Z., Hassan, Siti L. M., Hmood Salman, Emad, Alghrairi, Mokhalad

    Published 2022
    “…This recommended SS algorithm, based on the hybrid filter detection (HFD) method, employs the Cosine law for filtering the traffic signal, and then enables segmentation by applying the Welch algorithm. …”
    Get full text
    Get full text
    Article
  6. 6

    Suspicious activities detection for anti-money laundering using machine learning techniques by Lim, Aun Chir

    Published 2025
    “…To solve money laundering, more effective techniques for detecting suspicious transactions must be developed. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8
  9. 9

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…Specifically, the objectives of this thesis are (i) to develop an image registration technique based on multigraph matching, (ii) to detect occluded objects through exploration of candidate object correspondences in longer frame sequences, and (iii) to develop a robust graph coloring algorithm for multiple moving object detection under different transformations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. This application is using the data from a Taiwan bank which is obtained from the UCI data repository website. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    A simultaneous spam and phishing attack detection framework for short message service based on text mining approach by Mohd Foozy, Cik Feresa

    Published 2017
    “…Within the field of SMS detection, only the framework for a single attack detection for Spam has been studied. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…The project utilised pre-processing process such as edge detection, orientation correction and Region of Interest (ROI) extraction that have been developed previously. …”
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In the experiment, we study the effect of introducing the outlier detection in RAN-LSH. As a result, by introducing the outlier detection, we confirm that the detection accuracy is enhanced on 377$ 3(53867$.$$1781.8781$0,1$+ average over the testing period. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Dynamic android malware category classification using semi-supervised deep learning by Mahdavifar, Samaneh, Kadir, Andi Fitriah Abdul, Fatemi, Rasool, Alhadidi, Dima, Ghorbani, Ali A

    Published 2020
    “…We use dynamic analysis to craft dynamic behavior profiles as feature vectors. Furthermore, we develop a new dataset, namely CICMalDroid2020, which includes 17,341 most recent samples of five different Android apps categories: Adware, Banking, SMS, Riskware, and Benign. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper