Search Results - (( java application based algorithm ) OR ( data detection techniques algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Analysis of Data Mining Tools for Android Malware Detection by Yusof, Robiah, Abdullah, Raihana Syahirah, Adnan, Nurul Syahirrah, Abd. Jalil, Nurlaily

    Published 2019
    “…There are various data mining tools available to analyze data related android malware detection. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
    Get full text
    Get full text
    Article
  8. 8

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    “…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
    Get full text
    Get full text
    Article
  9. 9

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
    Get full text
    Get full text
    Article
  10. 10

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
    Get full text
    Get full text
    Article
  11. 11

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
    Get full text
    Get full text
    Article
  12. 12

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Akmar Ismail, Saidatul, Mahdin, Hairulnizam

    Published 2023
    “…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
    Get full text
    Get full text
    Article
  13. 13

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Akmar Ismail, Saidatul, Mahdin, Hairulnizam

    Published 2023
    “…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
    Get full text
    Get full text
    Article
  14. 14

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Further, the shortage of efficient feature selection techniques gives rise to low accuracy in anomaly detection. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications by Usmani, U.A., Happonen, A., Watada, J.

    Published 2022
    “…The traditional algorithms need data preparations while unsupervised algorithms can be prepared so that they can handle the data in war format. …”
    Get full text
    Get full text
    Article
  17. 17

    An Evolutionary Stream Clustering Technique for Outlier Detection by Supardi, N.A., Abdulkadir, S.J., Aziz, N.

    Published 2020
    “…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article