Search Results - (( developing security classification algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. …”
    Article
  6. 6

    A framework for classification software security using common vulnerabilities and exposures by Hassan, Nor Hafeizah

    Published 2018
    “…The main research aim is to investigate what information is necessary to make a formal vulnerability pattern representation.This is done through the usage of formal Backus-Naur-Form syntax for the execution and presented with newly created vulnerability flow diagram.Some future works were also proposed to further enhance the elements in the secured soft-ware process framework.This thesis focuses on the research and development of the design, formalization and translation of the vulnerability classification pattern through a framework using common vulnerabilities and exposures data.To achieve this aim, the following work was carried out.First step is to create and conceptualized necessary meta-process.Second step is to specify the relationship between the classifiers and vulnerability classification pat-terns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Iris is one of the biometric that widely used in the field of security due to its uniqueness. There are a lot of feature extraction methods and classification methods for iris classification. …”
    Get full text
    Get full text
    Monograph
  8. 8

    PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm by Muhamad Zahim, Sujod, Siti Nor Azlina, Mohd Ghazali, Mohd Fadzil, Abdul Kadir, Al-Shetwi, Ali Qasem

    Published 2024
    “…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor by Md Noor, Siti Salwa

    Published 2013
    “…Integration of multimodal biometrics is one of the well known techniques for security enhancement. Hence, in this research the integration of car plate and face recognition as security enhancement in private parking area has been developed to ensure the car is driven by the authorized or registered owner. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…But irrelevant and redundant features are the obstacle for classification algorithm to build an efficient detection model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Energy-efficient intrusion detection in wireless sensor network by Salehian, Solmaz, Masoumiyan, Farzaneh, Udzir, Nur Izura

    Published 2012
    “…There are several algorithms for building Intrusion Detection Systems (IDS) based on different WSN routing protocol classifications with respect to energy-efficient manner. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Shahirudin, Syamir, Abd Halim, Iman Hazwam, Jamaluddin, Muhammad Nabil Fikri

    Published 2023
    “…This study was solely concerned with the Windows malware dataset. The malware classification was determined by testing and training the supervised ML algorithms using the extracted features from the malware dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept by Madihah Mohd Saudi, Farida Hazwani Mohd Ridzuan, Nurlida Basir, Nur Fatin Nabila Mohd Rafei Heng, Sakinah Ali Pitchay, Ahmad, IN

    Published 2024
    “…Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. …”
    Proceedings Paper
  18. 18

    Hybrid ensemble learning techniques for intrusion detection systems in Internet of Things security by Soni

    Published 2025
    “…The first technique employed the XGBoost and LightGBM algorithms to solve a binary classification problem across seven different datasets. …”
    Get full text
    Get full text
    UMK Etheses
  19. 19

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The key results encompass dataset preprocessing, Decision Tree classification model training, user interface development, and the evaluation of the Decision Tree model's performance. …”
    Get full text
    Get full text
    Thesis
  20. 20