Search Results - (( security classifications learning algorithm ) OR ( basic optimization based algorithm ))
Search alternatives:
- security classifications »
- classifications learning »
- learning algorithm »
- basic optimization »
-
1
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…However, the training datasets usually compose feature sets of irrelevant or redundant information, which impacts the performance of classification, and traditional learning algorithms such as backpropagation suffer from known issues, including slow convergence and the trap of local minimum. …”
Get full text
Get full text
Thesis -
2
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…The best phishing classification features and machine learning technique are identified in order to produce and generate a classification model. …”
Get full text
Get full text
Thesis -
3
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024Subjects:Article -
4
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…The IDS with machine learning method improves the detection accuracy of the security attacks. …”
Get full text
Get full text
Get full text
Article -
5
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
6
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
7
-
8
-
9
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024Proceedings Paper -
10
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…This study was solely concerned with the Windows malware dataset. The malware classification was determined by testing and training the supervised ML algorithms using the extracted features from the malware dataset. …”
Get full text
Get full text
Get full text
Article -
11
A novel framework for identifying twitter spam data using machine learning algorithms
Published 2020“…The research results contribute significantly to the field of cyber-security by forming a real-time system using machine learning algorithms.…”
Get full text
Get full text
Get full text
Article -
12
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
Get full text
Get full text
Thesis -
13
BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning
Published 2023“…Android (operating system); Android malware; Classification (of information); Feature Selection; Learning systems; Mobile security; Android apps; Classification models; Feature weight; Features selection; Machine learning algorithms; Machine-learning; Malware detection; Malwares; Memory usage; Selection techniques; Learning algorithms…”
Article -
14
Maldroid- attribute selection analysis for malware classification
Published 2019“…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Fuzzy adaptive teaching learning-based optimization for solving unconstrained numerical optimization problems
Published 2022“…The performance of the fuzzy adaptive teaching learning-based optimization is evaluated against other metaheuristic algorithms including basic teaching learning-based optimization on 23 unconstrained global test functions. …”
Get full text
Get full text
Get full text
Article -
17
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
Get full text
Get full text
Thesis -
18
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
Get full text
Get full text
Thesis -
19
Named entity recognition using a new fuzzy support vector machine.
Published 2008Get full text
Get full text
Article -
20
Malicious URL classification using artificial fish swarm optimization and deep learning
Published 2023“…With this motivation, the current article develops an Artificial Fish Swarm Algorithm (AFSA) with Deep Learning Enabled Malicious URL Detection and Classification (AFSADL-MURLC) model. …”
Get full text
Get full text
Get full text
Get full text
Article
