Search Results - (( java application customization algorithm ) OR ( security classification problems algorithm ))

Refine Results
  1. 1
  2. 2

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…The research investigates malware and machine learning in the context of cybersecurity, including malware detection taxonomy and machine learning algorithm classification into numerous categories. …”
    Article
  4. 4

    Maldroid- attribute selection analysis for malware classification by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Mohd Zamri, Osman

    Published 2019
    “…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm by Slamet, ., Izzeldin Ibrahim, Mohamed Abdelaziz

    Published 2022
    “…Regardless of the methods implemented by this system, eliminating false alerts is still a huge problem. To describe data traffic passing through the network, a database of the network security layer (NSL) knowledge discovery in database (KDD) dataset is used. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A novel framework for identifying twitter spam data using machine learning algorithms by Maziku, Susana Boniphace, Abdul Rahiman, Amir Rizaan, Muhammed, Abdullah, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…Previous studies have approached spam detection as a classification problem, high dimension, time-consuming problem, which requires new methods to address the problems. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Diagnosis security problems in cloud computing for business cloud by Shakir M., Abubakar A.B., Yousoff Y.B., Sagher A.M., Alkayali H.

    Published 2023
    “…This paper aims to examine the security problems and to identify the characteristics of such security problems, in addition this study will examine the important issues in security cloud computing and will determine the frames to improve security systems for cloud computing. …”
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…Based on the selected features, the classification is performed. The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval by Slamet, Slamet, Izzeldin, Ibrahim Mohamed Abdelaziz

    Published 2022
    “…Regardless of the methods implemented by this system, eliminating false alerts is still a huge problem. To describe data traffic passing through the network, a database of the network security layer (NSL) knowledge discovery in database (KDD) dataset is used. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…Several directions can be taken to extend this work such as a combination of an IDS with the IPS system to be capable of dropping or blocking network connections that are determined too risky, extend the model for multi-class classification problems and using hybrid IDS (combining anomaly and signature-based detection systems) to respond to wider ranges of intrusions and increase the level of security of a network.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…Based on the selected features, the classification is performed. The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. …”
    Get full text
    Get full text
    Thesis
  16. 16

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…But irrelevant and redundant features are the obstacle for classification algorithm to build an efficient detection model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security by Pitafi, S., Anwar, T., Dewa Made Widia, I., Yimwadsana, B.

    Published 2023
    “…After collecting the data from above mentioned sensors we applied machine learning algorithms DBSCAN to cluster the data points and K-NN classification to classify those clusters in one-dimensional data, but the results were not much satisfying. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean by Lorpunmanee, Siriluck, Abdullah, Abdul Razak

    Published 2007
    “…Grid computing is the principle in utilizing and sharing large-scale resources to solve complex scientific problems. Under this principle, Grid environment has problems in flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources. …”
    Get full text
    Article