Search Results - (( security application learning algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…However, the increased security breaches of recent mental health applications that leaked the patient's profile. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  3. 3

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  4. 4

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…In this paper, we have examined and presented the most recent research on developing robust IDSs using Deep Learning (DL) algorithms, including Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Stacked Autoencoders (SAE), and Deep Belief Networks (DBN). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions by Almazrouei O.S.M.B.H., Magalingam P., Hasan M.K., Shanmugam M.

    Published 2024
    “…In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. …”
    Review
  6. 6

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8

    A Study On AI-Driven Solutions for Cloud Security Platform by Menaga, Segar, Mohamad Fadli, Zolkipli

    Published 2024
    “…Cognitive tasks comprise integration, computational cost, and the ethical effect of the algorithm are identified and discussed. Real-world applications and possibilities for further development, such as federated learning and XAI, are also described in order to give recommendations for the effective application of AI-based cloud security. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity by Yau, Jia Xin

    Published 2023
    “…The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. The study evaluates and compares the efficacy of multiple machine learning algorithms, including the Autoencoder classifier, Extreme Gradient Boost (XGBoost), and Random Forest classifier, using metrics such as accuracy, precision, recall, and F1-score. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Deep Learning Based Face Attributes Recognition by Saidi, Mohamad Hazim

    Published 2018
    “…The automated face identification application is helpful in assisting forensic to survey an area with the implementation of Machine Learning (ML). …”
    Get full text
    Get full text
    Monograph
  17. 17
  18. 18
  19. 19
  20. 20

    Glass break detection system using deep auto encoders with fuzzy rules induction algorithm by Nyein Naing, Wai Yan, Htike, Zaw Zaw

    Published 2019
    “…This leads to the inability to differentiate glass break from environmental sounds (such as the sound of striking objects, heavy sounds and shouted sounds) that are similar in their amplitude threshold and frequency pattern. Machine learning based acoustic audio classification has been popular in security surveillance applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article