Search Results - (( using function method algorithm ) OR ( botnet detection learning algorithm ))
Search alternatives:
- detection learning »
- learning algorithm »
- method algorithm »
- function method »
- using function »
-
1
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
2
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. …”
Get full text
Get full text
Article -
3
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
4
-
5
-
6
A Static Approach towards Mobile Botnet Detection
Published 2016“…In this study we propose a static approach towards mobile botnet detection. This technique combines MD5, permissions, broadcast receivers as well as background services and uses machine learning algorithm to detect those applications that have capabilities for mobile botnets. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A smart framework for mobile botnet detection using static analysis
Published 2020“…This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. …”
Get full text
Get full text
Get full text
Article -
8
An enhanced android botnet detection approach using feature refinement
Published 2019“…In order to detect botnet attacks which causes immense chaos and problems to smartphones, first the Android botnet need to be analysed. …”
Get full text
Get full text
Thesis -
9
-
10
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
11
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
12
Secure IIoT-enabled industry 4.0
Published 2021“…IIoT-enabled botnets are highly scalable, technologically diverse, and highly resilient to classical and conventional detection mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning
Published 2024“…Machine learning algorithms have been proposed to identify bot networks with a focus on extracting features from high-dimensional datasets. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Android mobile malware detection model based on permission features using machine learning approach
Published 2022“…Both samples of datasets then were evaluated using machine learning and deep learning approaches to analyse the best accuracy of malware detection. …”
Get full text
Get full text
Thesis -
15
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
Get full text
Get full text
Thesis -
16
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
17
Determining the preprocessing clustering algorithm in radial basis function neural network
Published 2008“…Three types of method used in this study to find the centres include random selections, K-means clustering algorithm and also K-median clustering algorithm. …”
Get full text
Get full text
Article -
18
Genetic Algorithms In Optimizing Membership Function For Fuzzy Logic Controller
Published 2010“…Thus it is important to select the accurate membership functions but these methods possess one common weakness where conventional FLC use membership function and control rules generated by human operator. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
The efficiency of conjugate gradient methods with global convergence / Siti Nur Hafiza Shamsudin
Published 2019“…The global convergence result is established using exact line searches. Numerical result shows that algorithm 2 which is one of the proposed CG methods is more efficiency when compared to other algorithms.…”
Get full text
Get full text
Thesis -
20
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
Published 2018“…It shows that the IQR-HEOM method is more efficient to rectify the problem caused by using range in HEOM. …”
Get full text
Get full text
Get full text
Thesis
