Search Results - (( security classification system algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- security classification »
- classification system »
- application mining »
- system algorithm »
- java application »
- mining algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria
Published 2010“…Modern interconnected power systems often consist of thousands of pieces of equipment each of which may have an effect on the security of the system. …”
Get full text
Get full text
Article -
5
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
6
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
7
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
8
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…From the past few years, Intrusion Detection Systems (IDS) are employed as a second line of defence and have shown to be a useful tool for enhancing security by detecting suspicious activity. …”
Get full text
Get full text
Get full text
Article -
9
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…Multilevel security is very important in Medical Emergency System MES since a database contained information with a variety of secret data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
File integrity monitor scheduling based on file security level classification
Published 2011“…Integrity of operating system components must be carefully handled in order to optimize the system security. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
12
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Due to the current methods in feature extraction are still improving, this project proposed a new feature extraction method to increase the performance of iris classification. In this project, a classification system is proposed with the one-dimensional local binary pattern algorithm (1D-LBP) with the K-Nearest Neighbour (K-NN) classifier and the system is developed by using a Raspberry Pi 3.There are eight different subjects used to classify in this classification system and each subject consists of seven samples of normalized iris image as input to the system. …”
Get full text
Get full text
Monograph -
13
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…In light of the escalating global concerns regarding energy security and the irregular distribution of daily irradiance affecting photovoltaic (PV) system output, the demand for effective fault detection and diagnosis techniques in PV management systems is on the rise. …”
Get full text
Get full text
Get full text
Article -
14
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
Get full text
Get full text
Thesis -
15
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
16
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
17
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024Subjects:Article -
18
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…This causes the classifier to be biased, reduce classification accuracy, and increase false alert. To that end, we proposed a model that significantly improve the accuracy of the intrusion detection system by eliminating false alerts, whether they are false negative or false positive negative alerts. …”
Get full text
Get full text
Get full text
Article
