Search Results - (( java applications security algorithm ) OR ( code classification based algorithm ))

Refine Results
  1. 1

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…Several machine learning techniques based on supervised learning have been adopted in the classification of malware. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Source code classification using latent semantic indexing with structural and frequency term weighting by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…This research proposes a Latent Semantic Indexing classifier that integrates information structural and frequency of terms in its weighting scheme.The content terms are identified by extracting words in the source code program. Based on the undertaken experiment the LSI classifier is noted to generate a higher precision and recall compared to the C4.5 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Scene classification for aerial images based on CNN using sparse coding technique by Qayyum, A., Malik, A.S., Saad, N.M., Iqbal, M., Faris Abdullah, M., Rasheed, W., Rashid Abdullah, T.A., Bin Jafaar, M.Y.

    Published 2017
    “…Recent developments include several approaches and numerous algorithms address the task. This article proposes a convolutional neural network (CNN) approach that utilizes sparse coding for scene classification applicable for HRRS unmanned aerial vehicle (UAV) and satellite imagery. …”
    Get full text
    Get full text
    Article
  10. 10

    Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun

    Published 2012
    “…In video coding, research is focused on the development of fast motion estimation (ME) algorithms while keeping the coding distortion as small as possible. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14

    Software Classification Using Structure-Based Descriptors by Ramadan, Qusai Hussein

    Published 2009
    “…A total of 2800 programs have been used during the training process while two different datasets of size (28) were used for testing. Based on the undertaken experiment, the IBK algorithm is noted to generate the highest classification accuracy (74.8%) compared to several other algorithms provided in the Weka tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Maldroid- attribute selection analysis for malware classification by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Mohd Zamri, Osman

    Published 2019
    “…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management by Khan, Fazeel Ahmed, Abubakar, Adamu

    Published 2024
    “…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…The algorithm requires source codes comparison based on keyword similarity to extract the words that exist in the two related source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Zalili, Musa, Amelia Ritahani, Ismail

    Published 2023
    “…In this research, a Crow Search Algorithm (CSA)-based metaheuristic strategy for feature extraction in HCR was developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item