Search Results - (( security classifications using algorithm ) OR ( using function based algorithm ))

Refine Results
  1. 1
  2. 2

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
    Proceedings Paper
  3. 3

    Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept by Madihah Mohd Saudi, Farida Hazwani Mohd Ridzuan, Nurlida Basir, Nur Fatin Nabila Mohd Rafei Heng, Sakinah Ali Pitchay, Ahmad, IN

    Published 2024
    “…Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. …”
    Proceedings Paper
  4. 4

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Nowadays more researchers use three type of approaches namely, Rule-base NER, Machine Learning-base NER and Hybrid NER to identify names. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…The second anomaly detection method is the Evolutionary Kernel Neural Network Random Weights (EKNNRW) in order to increase the accuracy of classification. The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…Passwords are frequently used to control access to restricted functions. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…The framework divides requirements for the design of hash function into three classifications namely design requirements, security requirements for Boolean function and analysis requirements. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Symmetric Key Size for Different Level of Information Classification by Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…Therefore confidential information is normally protected by using cryptographic algorithms. In these algorithms, key is an important element since it is one of the parameters that determine the level of security that the algorithms can provide. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    SVM-based geospatial prediction of soil erosion under static and dynamic conditioning factors by Muhammad Raza, Ul Mustafa, Abdulkadir, Taofeeq Sholagber, Khamaruzaman, Wan Yusof, Ahmad Mustafa, Hashim, M., Waris, Muhammad, Shahbaz

    Published 2018
    “…The study implements four kernel tricks of SVM with sequential minimal optimization algorithm as a classifier for soil erosion susceptibility modeling. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Spear- phishing attack detection using artificial intelligence by Rajkumaradevan, Sanglidevan

    Published 2024
    “…The goal is to mitigate phishing and spam threats by using advanced algorithms to detect malicious URLs and classify messages effectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17
  18. 18

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.] by Rastogi, Sarthak, Shrotriya, Archit, Singh, Mitul Kumar, Potukuchi, Raghu Vamsi

    Published 2022
    “…The IDS with machine learning method improves the detection accuracy of the security attacks. To this end, this paper studies the classification analysis of intrusion detection using various supervised learning algorithms such as SVM, Naive Bayes, KNN, Random Forest, Logistic Regression and Decision tree on the NSL-KDD dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria by Zakaria, Mohd Fathi

    Published 2010
    “…This paper presented an application of Artificial Neural Network (ANN) in steady state stability classifications. A multi layer feed forward ANN with Back Propagation Network algorithm is proposed in determining the steady state stability classifications. …”
    Get full text
    Get full text
    Article