Search Results - (( developing botnet detection algorithm ) OR ( java implementation path algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    ABC: android botnet classification using feature selection and classification algorithms by Abdullah, Zubaile, Mohd Saudi, Madihah, Anuar, Nor Badrul

    Published 2017
    “…Due to the fast modifications in the technologies used by malicious application (app) developers, there is an urgent need for more advanced techniques for Android botnet detection. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Botnet detection using automated script / Norfathin Rosli by Rosli, Norfathin

    Published 2020
    “…The project is dedicated for Network and Security Analyst to develop better algorithm for botnet detect and prevents. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…This new classification can be used as the input for mobile botnet detection for future work, especially for financial matters.…”
    Proceedings Paper
  5. 5

    Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network by Ahmed, Abdulghani Ali

    Published 2019
    “…The proposed technique aims to detect Botnet zero-day attack in real time. This technique applies a backpropagation algorithm to the CTU-13 dataset to train and evaluate the Botnet detection classifier. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    A Static Approach towards Mobile Botnet Detection by Shahid, Anwar, Jasni, Mohamad Zain, Inayat, Zakira, Ul Haq, Riaz, Ahmad, Karim, Jaber, Aws Naser

    Published 2016
    “…In this study we propose a static approach towards mobile botnet detection. This technique combines MD5, permissions, broadcast receivers as well as background services and uses machine learning algorithm to detect those applications that have capabilities for mobile botnets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…This paper proposed an enhancement approach for Android botnet classification based on features selection and classification algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning by Thrupthi, C.P., Chitra, K., Harilakshmi, V.M.

    Published 2024
    “…Botnets are compromised computer networks controlled by attackers that are visible for this reason. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis