Search Results - (( developing security svm algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- svm algorithm »
- security svm »
-
1
-
2
A hybrid intrusion detection system based on different machine learning algorithms
Published 2013“…There are numerous study in intrusion detection system (IDS) especially with Genetic algorithms (GA) and Support Vector Machine (SVM) but most of them did not get the potential of hybrid SVM using GA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
SVM for network anomaly detection using ACO feature subset
Published 2016Get full text
Get full text
Conference or Workshop Item -
4
SVM-based geospatial prediction of soil erosion under static and dynamic conditioning factors
Published 2018“…The study implements four kernel tricks of SVM with sequential minimal optimization algorithm as a classifier for soil erosion susceptibility modeling. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Preliminary analysis of malware detection in opcode sequences within IoT environment
Published 2020“…This development is opening to many security and privacy challenges that can cause complete network breakdown, bypassed access control or the loss of critical data. …”
Get full text
Get full text
Get full text
Article -
6
Study of machine learning in computer vision using Raspberry Pi
Published 2024text::Final Year Project -
7
-
8
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025“…The proposed system is developed using a Raspberry Pi 3 Home Server (RHS) driven by the Support Vector Machine (SVM) algorithm. …”
Article -
9
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
10
Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review
Published 2023“…The goal of this study is to show the results of analyzing various classification algorithms in terms of confusion matrix, accuracy, precision, specificity, sensitivity, and f-score to Develop an Intrusion Detection System (IDS) model.…”
Get full text
Get full text
Get full text
Article -
11
SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan
Published 2018“…The core detection and prevention algorithm which is the support vector machine (SVM) were implemented in this project. …”
Get full text
Get full text
Student Project -
12
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…The original FVRS developed only provides verification instead of identification. …”
Get full text
Get full text
Monograph -
14
Biometric identification and recognition for IRIS using Failure Rejection Rate (FRR) / Musab Ahmed Mohammed Ali Al-Rawi
Published 2016“…Hence, the objectives of this research are new algorithms development significantly for iris segmentation specifically the proposed Fusion of Profile and Mask Technique (FPM) specifically in getting the actual center of the pupil with high level of accuracy prior to iris localization task, followed by a particular enhancement in iris normalization that is the application of quarter size of an iris image (instead of processing a whole or half size of an iris image) and for better precision and faster recognition with the robust Support Vector Machine (SVM) as classifier. …”
Get full text
Get full text
Book Section -
15
Malware visualizer: A web apps malware family classification with machine learning
Published 2021“…This project uses three classification algorithm which are Random Forest (RF), Support Vector Machine (SVM), and Convolutional Neural Network (CNN). …”
Get full text
Get full text
Conference or Workshop Item -
16
A hybrid chromaticity-morphological machine learning model to overcome the limit of detecting newcastle disease in experimentally infected chicken within 36 h
Published 2025“…This work demonstrates a promising methodology in developing machine learning algorithm using hybrid chromaticity-morphological features for early detection of virus-infected chickens, contributing to the goal of a sustainable and healthier planet.…”
Get full text
Get full text
Get full text
Article -
17
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
18
Near-infrared technique for oil palm fruit grading system
Published 2013“…The application software was developed in a MATLAB 7.0 environment, and was used to classify the oil palm FFBs. …”
Get full text
Get full text
Thesis -
19
Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali
Published 2016“…Hence, the objectives of this research are new algorithms development significantly for iris segmentation specifically the proposed Fusion of Profile and Mask Technique (FPM) specifically in getting the actual center of the pupil with high level of accuracy prior to iris localization task, followed by a particular enhancement in iris normalization that is the application of quarter size of an iris image (instead of processing a whole or half size of an iris image) and for better precision and faster recognition with the robust Support Vector Machine (SVM) as classifier. …”
Get full text
Get full text
Thesis -
20
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…To stop the increase in cybercrimes, everyone, including normal citizens, needs to know how secure they are while using digital appliances. A system is developed to predict the risk of users based on their behaviour when they are online using real-life behavioural data obtained from a private university’s 207 undergraduates. …”
Get full text
Get full text
Get full text
Get full text
Article
