Search Results - (( java application mining algorithm ) OR ( attack decision process algorithm ))
Search alternatives:
- application mining »
- process algorithm »
- java application »
- mining algorithm »
- decision process »
- attack decision »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…The survey covers the research conducted between 2016 and 2021(34 peer-reviewed journal articles and 28 conference papers), identifying and categorizing the main methodologies and technologies employed in generating and analyzing attack graphs. In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. …”
Review -
6
Design and analysis of an early heart attack detection using openCV
Published 2022“…Millions of people die every year from heart attacks, according to research. The healthcare industry generates massive volumes of data related to heart attacks, but this data is sadly not being processed for hidden insights that could improve decision-making. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
9
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
11
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Diagnosis and treatment recommender system for myocardial infarction using decision tree and Support Vector Machines (SVM) / Wan Marzuqiamrin Wan Mansor
Published 2025“…This project presents the development process of the prototype for diagnosis and treatment recommender system for myocardial infarction using decision tree and support vector machine (SVM) algorithms. …”
Get full text
Get full text
Thesis -
14
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
18
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
19
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
Published 2020“…Decision Tree, AdaBoost, Random Forest, K-Nearest Neighbors and Naive Bayes are then used to classify each attack according to their profile features. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article
