Search Results - (( java application optimisation algorithm ) OR ( security classification bayes algorithm ))

Refine Results
  1. 1
  2. 2

    Malware Classification Using Ensemble Classifiers by Mohd Hanafi Ahmad Hijazi, Tan Choon Beng, Lim, Yuto, Kashif Nisar, James Mountstephen

    Published 2018
    “…Algorithms and classifiers such as k-Nearest Neighbor, Artificial Neural Network, Support Vector Machine, Naïve Bayes, and Decision Tree had shown their effectiveness towards malware classification in various recent researches. …”
    Get full text
    Get full text
    Article
  3. 3

    An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.] by Rastogi, Sarthak, Shrotriya, Archit, Singh, Mitul Kumar, Potukuchi, Raghu Vamsi

    Published 2022
    “…The IDS with machine learning method improves the detection accuracy of the security attacks. To this end, this paper studies the classification analysis of intrusion detection using various supervised learning algorithms such as SVM, Naive Bayes, KNN, Random Forest, Logistic Regression and Decision tree on the NSL-KDD dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    Prediction of college student academic performance using data mining techniques. by Abd Jalil, Azura, Mustapha, Aida, Santa, Dzulizah, Zain, Nurul Zaiha, Radwan, Rizalina

    Published 2013
    “…The classification algorithms used are the Decision Tree, Naïve Bayesian, and Multilayer Perception with the highest classification accuracy by the Naive Bayes algorithm with accuracy of 95.3%. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Shahirudin, Syamir, Abd Halim, Iman Hazwam, Jamaluddin, Muhammad Nabil Fikri

    Published 2023
    “…The malware classification was determined by testing and training the supervised ML algorithms using the extracted features from the malware dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Phishing image spam classification research trends: Survey and open issues by John Abari, Ovye, Mohd Sani, Nor Fazlida, Khalid, Fatimah, Mohd Yunus Bin Sharum, Mohd Yunus, Mohd Ariffin, Noor Afiza

    Published 2020
    “…A phishing email is an attack that focused completely on people to circumvent existing traditional security algorithms. The email appears to be a dependable, appropriate, and solid communication medium for internet users. …”
    Get full text
    Get full text
    Article
  14. 14

    Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review by Dehkordi, Iman Farhadian, Manochehri, Kooroush, Aghazarian, Vahe

    Published 2023
    “…The goal of this study is to show the results of analyzing various classification algorithms in terms of confusion matrix, accuracy, precision, specificity, sensitivity, and f-score to Develop an Intrusion Detection System (IDS) model.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. Also, from a comparison view, TLSMalDetect’s Random Forest precision of 98.99% and NB recall of 92.91% exceeded the best relevant findings of previous studies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An improved hybrid learning approach for better anomaly detection by Mohamed Yassin, Warusia

    Published 2011
    “…Next, a number of classifiers like Naïve Bayes, OneR, and Random Forest separately applied to these data to group all data into the right categories. …”
    Get full text
    Get full text
    Thesis
  17. 17

    GA-based feature subset selection in a spam/non-spam detection system by Behjat, Amir Rajabi, Mustapha, Aida, Nezamabadi-pour, Hossein, Sulaiman, Md. Nasir, Mustapha, Norwati

    Published 2012
    “…Spam has created a significant security problem for computer users everywhere. Spammers take an advantage of defrauds to cover parts of messages that can be used for identification of spam. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Spear- phishing attack detection using artificial intelligence by Rajkumaradevan, Sanglidevan

    Published 2024
    “…By integrating these applications into broader security frameworks, their impact could be further enhanced. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
    Get full text
    Get full text
    Thesis