Search Results - (( developing security bayes algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2

    Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin by Mohd Shahirudin, Syamir

    Published 2022
    “…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Comparison of hidden Markov Model and Naïve Bayes algorithms among events in smart home environment by Babakura, Abba, Sulaiman, Md Nasir, Mustapha, Norwati, Kasmiran, Khairul A.

    Published 2014
    “…In this paper, we propose Hidden Markov Model (HMM) and Naïve Bayes (NB) to test the accuracy and response time of the home data and to compare between the two algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Shahirudin, Syamir, Abd Halim, Iman Hazwam, Jamaluddin, Muhammad Nabil Fikri

    Published 2023
    “…This study includes the scripting and development of supervised ML techniques such as Decision Tree (DT), K-Nearest Neighbors (KNN), Naive Bayes, Random Forest, and Neural Networks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Evaluating Machine Learning Algorithms for Fake Currency Detection by Keerthana, S.N, Chitra, K.

    Published 2024
    “…Our findings contribute to developing reliable, automated systems for counterfeit detection, and enhancing financial security…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review by Dehkordi, Iman Farhadian, Manochehri, Kooroush, Aghazarian, Vahe

    Published 2023
    “…The goal of this study is to show the results of analyzing various classification algorithms in terms of confusion matrix, accuracy, precision, specificity, sensitivity, and f-score to Develop an Intrusion Detection System (IDS) model.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Android malware detection using permission based static analysis by Mohd Ariffin, Noor Afiza, Casinto, Hanna Pungo

    Published 2024
    “…Then, K-nearest Neighbor (KNN) and Naïve Bayes (NB) algorithms are applied, and the proposed method is compared with the previous studies and the expected experimental results of the proposed approach will be higher.…”
    Get full text
    Get full text
    Article
  14. 14

    Android malware detection using permission based static analysis by Mohd Ariffin, Noor Afiza, Casinto, Hanna Pungo

    Published 2023
    “…Then, K-nearest Neighbor (KNN) and Na¯ve Bayes (NB) algorithms are applied, and the proposed method is compared with the previous studies and the expected experimental results of the proposed approach will be higher.…”
    Get full text
    Get full text
    Article
  15. 15

    Improving malicious detection rate for Facebook application in OSN platform by Angamuthu, Laavanya

    Published 2018
    “…Our key contribution in this part is in developing malware detection in Facebook third party application by using Naïve Bayes algorithm technique .We identify a set of features that help us distinguish malicious apps from benign ones. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Detection of SQL injection attack using machine learning by Tung, Tean Thong

    Published 2024
    “…The machine learning algorithms employed in this study encompass Convolutional Neural Networks (CNN), Logistic Regression, Naïve Bayes Classifier, Support Vector Machine, and Random Forest. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    Spear- phishing attack detection using artificial intelligence by Rajkumaradevan, Sanglidevan

    Published 2024
    “…By integrating these applications into broader security frameworks, their impact could be further enhanced. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19
  20. 20

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Intrusion detection systems (IDSs) effectively balance additional security in a computer system by identifying intrusive activities on a computer system, and their enhancements are developing at a surprising rate. …”
    Get full text
    Get full text
    Thesis