Search Results - (( evolution utilisation detection algorithm ) OR ( java application modified algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1
  2. 2

    A static analysis approach for android permission-based malware detection systems by Juliza, Mohamad Arif, Mohd Faizal, Ab Razak, Suryanti, Awang, Sharfah Ratibah, Tuan Mat, Nor Syahidatul Nadiah, Ismail, Ahmad Firdaus, Zainal Abidin

    Published 2021
    “…The results indicated that with a TPR value of 91.6%, the Random Forest algorithm achieved the highest level of accuracy in malware detection.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Urban green space spatio-temporal change influences on land surface temperature in Kuala Lumpur, Malaysia by Abu Kasim, Junainah

    Published 2020
    “…The new automated model utilising highresolution aerial imagery has great potential to assist city planners and professionals in extracting, updating and detecting land use changes, particularly for UGS by applying a comprehensive procedure through a geographical information system (GIS) platform. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7