Search Results - (( java data visualization algorithm ) OR ( based malware optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…Particle swarm optimization (PSO) is used to optimize the random generation of candidate detectors and parameters associated with apriori algorithm (AA) for features selection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…Several machine learning techniques based on supervised learning have been adopted in the classification of malware. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4
  5. 5

    An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection by Shing, Chiang Tan, Mohammed Al-Andoli, Mohammed Nasser, Kok, Swee Lim, Pey, Yun Goh, Chee, Peng Lim

    Published 2023
    “…During the training and optimization process, these base learners adopt a hybrid BP and Particle Swarm Optimization algorithm to combine both local and global optimization capabilities for identifying optimal features and improving the classification performance. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization by Saudi, MM, Abuzaid, AM, Taib, BM, Abdullah, ZH

    Published 2024
    “…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
    Proceedings Paper
  7. 7

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…The lack of RGB image-based malware datasets hampers the performance of existing deep learning (DL) models, which require large datasets for high accuracy and face challenges such as time-consuming hyperparameter optimization. …”
    thesis::doctoral thesis
  8. 8

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…The result shows that the detection of malware within application category achieves higher accuracy compared to application with non-category based. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Integrating Information Gain and Chi-Square for Enhanced Malware Detection Performance by Rafrastara, Fauzi Adi, Ghozi, Wildanil, Sani, Ramadhan Rakhmat, Handoko, Lekso Budi, Abdussalam, Abdussalam, Pramudya, Elkaf Rahmawan, M. Abdollah, Faizal

    Published 2025
    “…As malware has progressed from its simpler, monomorphic variants to more sophisticated forms like oligomorphic, polymorphic, and metamorphic, a machine learning-based detection system is now required, surpassing the limitations of traditional signature-based methods. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent by Kong, Jun Hao

    Published 2023
    “…At the end of the process, the system will utilise this model to detect cryptojacking and users will be able to detect new cryptojacking malware based on the model. This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  18. 18

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
    Get full text
    Get full text
    Monograph
  19. 19
  20. 20

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item