Search Results - (( intelligence based malware algorithm ) OR ( intelligence based dea algorithm ))
Search alternatives:
- intelligence based »
- malware algorithm »
- based malware »
- dea algorithm »
- based dea »
-
1
-
2
-
3
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Apart from that, sizing algorithm with DEA was also discovered to outperform sizing algorithms with selected computational intelligence, i.e. …”
Get full text
Get full text
Thesis -
4
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…In addition, DL-based malware detection methods often entail single classifiers. …”
Get full text
Get full text
Get full text
Article -
5
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
6
-
7
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
8
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…This research presents a mobile malware static detection method based on Naive Bayes. …”
Get full text
Get full text
Thesis -
9
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023Get full text
Get full text
Undergraduates Project Papers -
10
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
Published 2022“…Therefore, it is essential to detect cryptojacking malware, as it poses a significant risk to users. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
