Search Results - (( java application based algorithm ) OR ( security classification technique algorithm ))
Search alternatives:
- classification technique »
- security classification »
- application based »
- java application »
-
1
K-NN classifier for data confidentiality in cloud computing
Published 2014“…In cloud, many techniques are used to secure the data. Data encryption is a data security technique which is widely used for data security. …”
Get full text
Get full text
Conference or Workshop Item -
2
Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria
Published 2010“…A multi layer feed forward ANN with Back Propagation Network algorithm is proposed in determining the steady state stability classifications. …”
Get full text
Get full text
Article -
3
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
4
-
5
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…The best phishing classification features and machine learning technique are identified in order to produce and generate a classification model. …”
Get full text
Get full text
Thesis -
6
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
7
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
Get full text
Get full text
Get full text
Article -
8
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
9
VEHICLE CLASSIFICATION USING NEURAL NETWORKS AND IMAGE PROCESSING
Published 2022“…The aim of this study is to propose a vehicle classification scheme where YOLO v5 algorithm and Faster R-CNN algorithm are being implemented separately into vehicle classification, followed by comparison of result between these two algorithms. …”
Get full text
Get full text
Get full text
Article -
10
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
Get full text
Get full text
Get full text
Article -
11
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. …”
Get full text
Get full text
Thesis -
12
File integrity monitor scheduling based on file security level classification
Published 2011“…This paper proposes an enhancement to the scheduling algorithm of the current file integrity monitoring approach by combining the off-line and on-line monitoring approach with dynamic inspection scheduling by performing file classification technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A Review on Soft Computing Technique in Intrusion Detection System
Published 2012“…In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security. …”
Get full text
Get full text
Get full text
Article -
14
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
15
Metaheuristic based ids using multi-objective wrapper feature selection and neural network classification
Published 2021“…This article proposes a cyber-intrusion detecting system classification with MLP trained by a hybrid metaheuristic algorithm and feature selection based on multi-objective wrapper method. …”
Get full text
Get full text
Conference or Workshop Item -
16
Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor
Published 2013“…Integration of multimodal biometrics is one of the well known techniques for security enhancement. Hence, in this research the integration of car plate and face recognition as security enhancement in private parking area has been developed to ensure the car is driven by the authorized or registered owner. …”
Get full text
Get full text
Thesis -
17
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. …”
Get full text
Get full text
Thesis -
18
Prediction of college student academic performance using data mining techniques.
Published 2013Get full text
Get full text
Conference or Workshop Item -
19
SVM for network anomaly detection using ACO feature subset
Published 2016“…But irrelevant and redundant features are the obstacle for classification algorithm to build an efficient detection model. …”
Get full text
Get full text
Conference or Workshop Item -
20
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis
