Search Results - (( java implementation tree algorithm ) OR ( using attack mining algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- mining algorithm »
- tree algorithm »
- attack mining »
- using attack »
-
1
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…The Phishing Rule-Based algorithm is used to extract SMS Phishing. For Module 2, the SMS Attack Profiling algorithm is used in order to produce SMS Spam and Phishing words. …”
Get full text
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
Get full text
Get full text
Article -
5
-
6
-
7
Improving intrusion detection using genetic algorithm
Published 2013“…The validity of this approach is verified using Knowledge Discovery and Data Mining Cup 1999 (KDD Cup ’99) dataset. …”
Get full text
Get full text
Get full text
Article -
8
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…This paper presents our work to improve the performance of anomaly intrusion detection using Fuzzy-ART based on the K-means algorithm. The K-means is a modified version of the standard K-means by initializing the value K from the value obtained after data mining using Fuzzy-ART and SNC labeling technique. …”
Get full text
Get full text
Get full text
Article -
9
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
10
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
11
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
12
An improved hybrid learning approach for better anomaly detection
Published 2011“…In recent years, data mining approach for intrusion detection have been proposed and used such as neural networks, clustering, genetic algorithms, decision trees, and support vector machines. …”
Get full text
Get full text
Thesis -
13
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Also, this research will use the most updated dataset wich called CICIDS2017 that it covers the majority of current intrusion and attacks. …”
Get full text
Get full text
Thesis -
14
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
Published 2013“…For this reason, it becomes necessary to categorize the degrees of threat using data mining techniques, especially where huge data are involved. …”
Get full text
Get full text
Thesis -
15
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
Published 2013“…In recent years, data mining approach for intrusion detection have been advised and used. …”
Get full text
Get full text
Get full text
Article -
16
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
17
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
18
A framework for malware identification based on behavior
Published 2012“…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. …”
Get full text
Get full text
Thesis -
19
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
20
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
Get full text
Get full text
Thesis
