Search Results - (( java implementation based algorithm ) OR ( based detection bayes algorithm ))
Search alternatives:
- implementation based »
- java implementation »
- based detection »
- detection bayes »
- bayes algorithm »
-
1
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
2
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…For CICIDS dataset, SVM algorithm achieved highest detection rate of 76.47% while decision tree and Naïve Bayes has 63.71% & 41.58% of detection rate, respectively. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
A Naïve-Bayes classifier for damage detection in engineering materials
Published 2007“…The Naïve-Bayes classifier and the proposed feature subset selection algorithm have been shown as efficient techniques for damage detection in engineering materials. …”
Get full text
Get full text
Get full text
Article -
4
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
Published 2013“…Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
Published 2013“…Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intrusive activities on a computer system, and their enhancement is emerging at an unexpected rate.Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Applying learning to filter text
Published 2005“…The use of probabilistic approaches such as naïve Bayes algorithm is the effective algorithms currently known for learning to filter or classify text document.Naïve Bayes algorithm is one of the algorithms in Machine Learning that manipulates probability estimation or reasoning about the observed data.The growing of bulk e-mail or known as spam e-mail becomes a threat to users’ privacy and network load and in the case of e -mail filtering,naïve Bayes classifier can be trained to automatically detect spam messages.Similar to the e-mail, forum application may be misused by the user to send bad messages and in some extent may offence other readers.Forum filtering may be less important compared to e-mail spam filtering; however there is a possibility of using naïve Bayes to learn the messages and automatically detect bad messages.Most of the forum application found in the web is applying keyword based text filtering which scan the words and change the detected words into certain representation.Instead of defining a set of keywords to filter the forum messages, this paper will explains the experiment in applying a learning to filter text especially in the educational and anonymous forum message, where there is no user registration required to submit messages.…”
Get full text
Get full text
Conference or Workshop Item -
7
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
An early warning detection system of terrorism in indonesia from Twitter contents using naïve bayes algorithm
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
10
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…Besides, Multilayer Perceptron algorithm has high true positive rate (TPR) in the detection of APT attack compared to Naïve Bayes algorithm. …”
Get full text
Get full text
Get full text
Other -
11
Performance comparison of classification algorithms for EEG-based remote epileptic seizure detection in wireless sensor networks
Published 2014“…Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems.Classification is the most important technique for wide-ranging applications to categorize the items according to its features with respect to predefined set of classes.In this paper, we conduct a performance evaluation based on the noiseless and noisy EEG-based epileptic seizure data using various classification algorithms including BayesNet, DecisionTable, IBK, J48/C4.5, and VFI.The reconstructed and noisy EEG data are decomposed with discrete cosine transform into several sub-bands.In addition, some of statistical features are extracted from the wavelet coefficients to represent the whole EEG data inputs into the classifiers.Benchmark on widely used dataset is utilized for automatic epileptic seizure detection including both normal and epileptic EEG datasets.The classification accuracy results confirm that the selected classifiers have greater potentiality to identify the noisy epileptic disorders.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…Besides, Multilayer Perceptron algorithm has high true positive rate (TPR) in the detection of APT attack compared to Naïve Bayes algorithm. …”
Get full text
Get full text
Get full text
Other -
13
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
14
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…Anomaly based intrusion detection is a type of intrusion detection system that identifies anomalies. …”
Get full text
Get full text
Get full text
Article -
15
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…The algorithms include Support Vector Machine (SVM), Naïve Bayes, and Decision Tree. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Fire Detection Algorithm using Image Processing Techniques
Published 2015Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
18
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
19
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…With the advancement of malware analysis, Machine Learning (ML) is increasingly being used to detect malware. This study's major objective is to compare the best-supervised ML algorithms for malware detection based on detection accuracy. …”
Get full text
Get full text
Get full text
Article -
20
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item
