Search Results - (( developing security bayes algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- bayes algorithm »
- security bayes »
-
1
-
2
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
Get full text
Get full text
Student Project -
3
Comparison of hidden Markov Model and Naïve Bayes algorithms among events in smart home environment
Published 2014“…In this paper, we propose Hidden Markov Model (HMM) and Naïve Bayes (NB) to test the accuracy and response time of the home data and to compare between the two algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
5
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…This study includes the scripting and development of supervised ML techniques such as Decision Tree (DT), K-Nearest Neighbors (KNN), Naive Bayes, Random Forest, and Neural Networks. …”
Get full text
Get full text
Get full text
Article -
6
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
7
Evaluating Machine Learning Algorithms for Fake Currency Detection
Published 2024“…Our findings contribute to developing reliable, automated systems for counterfeit detection, and enhancing financial security…”
Get full text
Get full text
Get full text
Get full text
Article -
8
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
Get full text
Get full text
Get full text
Article -
10
Android Ransomware Detection Based on Dynamic Obtained Features
Published 2024journal::journal article -
11
-
12
Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review
Published 2023“…The goal of this study is to show the results of analyzing various classification algorithms in terms of confusion matrix, accuracy, precision, specificity, sensitivity, and f-score to Develop an Intrusion Detection System (IDS) model.…”
Get full text
Get full text
Get full text
Article -
13
Android malware detection using permission based static analysis
Published 2024“…Then, K-nearest Neighbor (KNN) and Naïve Bayes (NB) algorithms are applied, and the proposed method is compared with the previous studies and the expected experimental results of the proposed approach will be higher.…”
Get full text
Get full text
Article -
14
Android malware detection using permission based static analysis
Published 2023“…Then, K-nearest Neighbor (KNN) and Na¯ve Bayes (NB) algorithms are applied, and the proposed method is compared with the previous studies and the expected experimental results of the proposed approach will be higher.…”
Get full text
Get full text
Article -
15
Improving malicious detection rate for Facebook application in OSN platform
Published 2018“…Our key contribution in this part is in developing malware detection in Facebook third party application by using Naïve Bayes algorithm technique .We identify a set of features that help us distinguish malicious apps from benign ones. …”
Get full text
Get full text
Thesis -
16
Detection of SQL injection attack using machine learning
Published 2024“…The machine learning algorithms employed in this study encompass Convolutional Neural Networks (CNN), Logistic Regression, Naïve Bayes Classifier, Support Vector Machine, and Random Forest. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Spear- phishing attack detection using artificial intelligence
Published 2024“…By integrating these applications into broader security frameworks, their impact could be further enhanced. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
20
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Intrusion detection systems (IDSs) effectively balance additional security in a computer system by identifying intrusive activities on a computer system, and their enhancements are developing at a surprising rate. …”
Get full text
Get full text
Thesis
