Search Results - (( intelligence based malware algorithm ) OR ( intelligence valid path algorithm ))
Search alternatives:
- intelligence based »
- intelligence valid »
- malware algorithm »
- path algorithm »
- based malware »
-
1
-
2
-
3
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…In addition, DL-based malware detection methods often entail single classifiers. …”
Get full text
Get full text
Get full text
Article -
4
Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques
Published 2024“…By contrast, the results of the safe path selection model were compared with the results obtained using Dijkstra's algorithm and the Floyd-Warshall algorithm. …”
thesis::doctoral thesis -
5
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
6
-
7
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
8
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…This research presents a mobile malware static detection method based on Naive Bayes. …”
Get full text
Get full text
Thesis -
9
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023Get full text
Get full text
Undergraduates Project Papers -
10
A novel Bezier curve control point search algorithm for autonomous navigation using N-order polynomial search with boundary conditions
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Intelligent guidance parking system using modified Dijkstra's algorithm
Published 2014“…This paper presents the intelligent parking system which apply Dijkstra’s algorithm in finding the shortest path. …”
Get full text
Get full text
Get full text
Article -
12
Design of Modeling Elements of Luoshan Shadow Puppets Creative Goods Based on Deep Learning
Published 2023“…The results show that the F1 value of the algorithm is about 94%, and the efficiency of the algorithm is high. …”
Get full text
Get full text
Get full text
Proceeding -
13
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih
Published 2019“…Since Constraint Satisfaction Problem (CSP) is an NP-complete problem, brute-force search algorithms such as Backtracking algorithm (BT) are required as the guarantee to find a solution, when there is one. …”
Get full text
Get full text
Thesis -
16
-
17
Optimization And Execution Of Multiple Holes-Drilling Operations Based On STEP-NC
Published 2021“…Optimization of tool path operation can lead to a significant reduction in non-productive machining time. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Distributed planning and control of multirobot formations with navigation and obstacle avoidance
Published 2011Get full text
Get full text
Conference or Workshop Item -
19
Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari
Published 2015“…Previous researches concentrated on using static algorithms to find the shortest path in VTRSs. However, providing a shortest path without considering other factors such as congestion, accidents, obstacles, travel time and speed is not a proper solution for vehicle traffic congestion problem. …”
Get full text
Get full text
Thesis -
20
Routing based multi-agent system for network reliability in the smart microgrid
Published 2020“…In this paper, the focus is to enhance the intelligence of microgrid networks using a multi-agent system while validation is carried out using network performance metrics i.e., delay, throughput, jitter, and queuing. …”
Get full text
Get full text
Article
