Search Results - (( java _ visualization algorithm ) OR ( based malware optimization algorithm ))
Search alternatives:
- malware optimization »
- based malware »
-
1
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…Several machine learning techniques based on supervised learning have been applied to classify malware. …”
Get full text
Get full text
Get full text
Article -
2
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…Particle swarm optimization (PSO) is used to optimize the random generation of candidate detectors and parameters associated with apriori algorithm (AA) for features selection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…Several machine learning techniques based on supervised learning have been adopted in the classification of malware. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
5
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…During the training and optimization process, these base learners adopt a hybrid BP and Particle Swarm Optimization algorithm to combine both local and global optimization capabilities for identifying optimal features and improving the classification performance. …”
Get full text
Get full text
Get full text
Article -
6
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
7
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…The lack of RGB image-based malware datasets hampers the performance of existing deep learning (DL) models, which require large datasets for high accuracy and face challenges such as time-consuming hyperparameter optimization. …”
thesis::doctoral thesis -
8
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…The result shows that the detection of malware within application category achieves higher accuracy compared to application with non-category based. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
-
10
-
11
A performance analysis of association rule mining algorithms
Published 2016“…The results of the CPU profiler of Java VisualVM showed that Binary-Based algorithm performs better than Eclat algorithm in-terms of both execution times and memory usage. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Integrating Information Gain and Chi-Square for Enhanced Malware Detection Performance
Published 2025“…As malware has progressed from its simpler, monomorphic variants to more sophisticated forms like oligomorphic, polymorphic, and metamorphic, a machine learning-based detection system is now required, surpassing the limitations of traditional signature-based methods. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
16
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…At the end of the process, the system will utilise this model to detect cryptojacking and users will be able to detect new cryptojacking malware based on the model. This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
Get full text
Get full text
Undergraduates Project Papers -
17
Visdom: Smart guide robot for visually impaired people
Published 2025“…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…The bio-inspired algorithm: particle swarm optimization (PSO) is used to optimized URLs features. …”
Get full text
Get full text
Get full text
Article -
19
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
Get full text
Get full text
Thesis -
20
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article
