Search Results - (( intelligence system vs algorithm ) OR ( intelligence based malware algorithm ))
Search alternatives:
- intelligence system »
- intelligence based »
- malware algorithm »
- based malware »
- vs algorithm »
- system vs »
-
1
-
2
-
3
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…In addition, DL-based malware detection methods often entail single classifiers. …”
Get full text
Get full text
Get full text
Article -
4
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
5
-
6
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
7
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…This research presents a mobile malware static detection method based on Naive Bayes. …”
Get full text
Get full text
Thesis -
8
-
9
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023Get full text
Get full text
Undergraduates Project Papers -
10
-
11
-
12
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Classroom finder system with student availability, space and time constraint
Published 2024“…The primary focus of the system is on facilitating efficient and conflict-free room assignments while considering various constraints and requirements by exploring the suitable Artificial Intelligence approaches and scheduling algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
-
15
-
16
Evaluating Adan vs. Adam: an analysis of optimizer performance in deep learning
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…Without treating the power system to be lossless, the tracing results are based on actual system condition; which means that they are consistent. …”
Get full text
Get full text
Thesis -
18
-
19
Camera coverage prioritization to support security monitoring
Published 2017Get full text
Get full text
Article -
20
