Search Results - (( java implementation model algorithm ) OR ( security classification system algorithm ))
Search alternatives:
- security classification »
- classification system »
- implementation model »
- java implementation »
- system algorithm »
- model algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
4
Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria
Published 2010“…Modern interconnected power systems often consist of thousands of pieces of equipment each of which may have an effect on the security of the system. …”
Get full text
Get full text
Article -
5
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
6
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
7
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…From the past few years, Intrusion Detection Systems (IDS) are employed as a second line of defence and have shown to be a useful tool for enhancing security by detecting suspicious activity. …”
Get full text
Get full text
Get full text
Article -
8
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
9
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…Multilevel security is very important in Medical Emergency System MES since a database contained information with a variety of secret data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
File integrity monitor scheduling based on file security level classification
Published 2011“…Integrity of operating system components must be carefully handled in order to optimize the system security. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
12
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Due to the current methods in feature extraction are still improving, this project proposed a new feature extraction method to increase the performance of iris classification. In this project, a classification system is proposed with the one-dimensional local binary pattern algorithm (1D-LBP) with the K-Nearest Neighbour (K-NN) classifier and the system is developed by using a Raspberry Pi 3.There are eight different subjects used to classify in this classification system and each subject consists of seven samples of normalized iris image as input to the system. …”
Get full text
Get full text
Monograph -
13
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…In light of the escalating global concerns regarding energy security and the irregular distribution of daily irradiance affecting photovoltaic (PV) system output, the demand for effective fault detection and diagnosis techniques in PV management systems is on the rise. …”
Get full text
Get full text
Get full text
Article -
14
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
Get full text
Get full text
Thesis -
15
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
16
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
17
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
18
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024Subjects:Article -
19
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…This causes the classifier to be biased, reduce classification accuracy, and increase false alert. To that end, we proposed a model that significantly improve the accuracy of the intrusion detection system by eliminating false alerts, whether they are false negative or false positive negative alerts. …”
Get full text
Get full text
Get full text
Article -
20
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project
