Search Results - (( using detection method algorithm ) OR ( mining classification problems algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm by Slamet, ., Izzeldin Ibrahim, Mohamed Abdelaziz

    Published 2022
    “…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…This paper seeks to conduct a thorough systematic literature review (SLR) and offer a taxonomy of machine learning methods for malware detection that considers these problems by analyzing 77 chosen research works related to malware detection using machine learning algorithm. …”
    Article
  5. 5

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2017
    “…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
    Get full text
    Get full text
    Book Chapter
  9. 9

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval by Slamet, Slamet, Izzeldin, Ibrahim Mohamed Abdelaziz

    Published 2022
    “…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Network problems detection and classification by analyzing syslog data by Jarghon, Fidaa A. M.

    Published 2016
    “…The method used data mining tool to classify the syslog messages while the description part of the syslog message was used for classification process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Evaluating integrated weight linear method to class imbalanced learning in video data by Mohd Apandi, Ziti Fariha, Mustapha, Norwati, Affendey, Lilly Suriani

    Published 2011
    “…In the second phase, the reduces instances are refined using the weight linear algorithm. The experiment results using 9 soccer video demonstrate that the integration of PCA and WL is capable to alleviates the imbalanced problem and able to improve classification performance in video data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Evaluation and optimization of frequent association rule based classification by Izwan Nizal Mohd Shaharanee, Jastini Jamil

    Published 2014
    “…Works on sustaining the interestingness of rules generated by data mining algorithms are actively and constantly being examined and developed. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Hybrid ant colony optimization and genetic algorithm for rule induction by Al-Behadili, Hayder Naser Khraibet, Ku-Mahamud, Ku Ruhana, Sagban, Rafid

    Published 2020
    “…The AntMiner classifier is efficient, useful and commonly used for solving rulebased classification problems in data mining. Ant-Miner, which is an ACO variant, suffers from local optimization problem which affects its performance. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…Finding a good classification algorithm is an important component of many data mining projects. …”
    Get full text
    Get full text
    Thesis