Search Results - (( java implementation plan algorithm ) OR ( using attack mining algorithm ))
Search alternatives:
- java implementation »
- implementation plan »
- mining algorithm »
- plan algorithm »
- attack mining »
- using attack »
-
1
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…The Phishing Rule-Based algorithm is used to extract SMS Phishing. For Module 2, the SMS Attack Profiling algorithm is used in order to produce SMS Spam and Phishing words. …”
Get full text
Get full text
Get full text
Thesis -
2
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
Get full text
Get full text
Article -
4
-
5
-
6
Improving intrusion detection using genetic algorithm
Published 2013“…The validity of this approach is verified using Knowledge Discovery and Data Mining Cup 1999 (KDD Cup ’99) dataset. …”
Get full text
Get full text
Get full text
Article -
7
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…This paper presents our work to improve the performance of anomaly intrusion detection using Fuzzy-ART based on the K-means algorithm. The K-means is a modified version of the standard K-means by initializing the value K from the value obtained after data mining using Fuzzy-ART and SNC labeling technique. …”
Get full text
Get full text
Get full text
Article -
8
A web-based implementation of k-means algorithms
Published 2022“…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The development of this project is based on a framework of 5 main stages: planning, analysis, design, implementation and testing. …”
Get full text
Get full text
Thesis -
10
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This methodology consist of Requirement and Planning, Design, Construction, Testing and Implementation. …”
Get full text
Get full text
Thesis -
12
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
13
An improved hybrid learning approach for better anomaly detection
Published 2011“…In recent years, data mining approach for intrusion detection have been proposed and used such as neural networks, clustering, genetic algorithms, decision trees, and support vector machines. …”
Get full text
Get full text
Thesis -
14
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
15
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Also, this research will use the most updated dataset wich called CICIDS2017 that it covers the majority of current intrusion and attacks. …”
Get full text
Get full text
Thesis -
17
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
Published 2013“…For this reason, it becomes necessary to categorize the degrees of threat using data mining techniques, especially where huge data are involved. …”
Get full text
Get full text
Thesis -
18
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
19
Songs Search Using Human Humming Voice
Published 2007“…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. Methodologies used in this system are based on system analysis and design methodology comprising planning, analysis, design and implementation. …”
Get full text
Get full text
Final Year Project -
20
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
Published 2013“…In recent years, data mining approach for intrusion detection have been advised and used. …”
Get full text
Get full text
Get full text
Article
