Search Results - (( security classification problems algorithm ) OR ( java implementation case algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…The research investigates malware and machine learning in the context of cybersecurity, including malware detection taxonomy and machine learning algorithm classification into numerous categories. …”
    Article
  6. 6

    Maldroid- attribute selection analysis for malware classification by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Mohd Zamri, Osman

    Published 2019
    “…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm by Slamet, ., Izzeldin Ibrahim, Mohamed Abdelaziz

    Published 2022
    “…Regardless of the methods implemented by this system, eliminating false alerts is still a huge problem. To describe data traffic passing through the network, a database of the network security layer (NSL) knowledge discovery in database (KDD) dataset is used. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    A novel framework for identifying twitter spam data using machine learning algorithms by Maziku, Susana Boniphace, Abdul Rahiman, Amir Rizaan, Muhammed, Abdullah, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…Previous studies have approached spam detection as a classification problem, high dimension, time-consuming problem, which requires new methods to address the problems. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Hybrid ensemble learning techniques for intrusion detection systems in Internet of Things security by Soni

    Published 2025
    “…This research developed three techniques to tackle challenges a large number of features, extensive datasets, data quality issues, and imbalanced classes in both binary and multi-class classifications. The first technique employed the XGBoost and LightGBM algorithms to solve a binary classification problem across seven different datasets. …”
    Get full text
    Get full text
    UMK Etheses
  13. 13

    Diagnosis security problems in cloud computing for business cloud by Shakir M., Abubakar A.B., Yousoff Y.B., Sagher A.M., Alkayali H.

    Published 2023
    “…This paper aims to examine the security problems and to identify the characteristics of such security problems, in addition this study will examine the important issues in security cloud computing and will determine the frames to improve security systems for cloud computing. …”
    Article
  14. 14
  15. 15
  16. 16
  17. 17

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  18. 18
  19. 19

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…Based on the selected features, the classification is performed. The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval by Slamet, Slamet, Izzeldin, Ibrahim Mohamed Abdelaziz

    Published 2022
    “…Regardless of the methods implemented by this system, eliminating false alerts is still a huge problem. To describe data traffic passing through the network, a database of the network security layer (NSL) knowledge discovery in database (KDD) dataset is used. …”
    Get full text
    Get full text
    Get full text
    Article