Search Results - (( using function using algorithm ) OR ( security classifications using algorithm ))
Search alternatives:
- security classifications »
- classifications using »
- using algorithm »
- using function »
-
1
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
2
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
3
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
Published 2024“…Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. …”
Proceedings Paper -
4
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
Get full text
Get full text
Thesis -
5
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
6
Android Ransomware Detection Based on Dynamic Obtained Features
Published 2024journal::journal article -
7
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
8
Implementation of lightweight cryptographic primitives
Published 2023“…These classifications are very useful because the primitives have different and sometimes contrary characteristics. …”
Article -
9
Implementation of lightweight cryptographic primitives
Published 2023“…These classifications are very useful because the primitives have different and sometimes contrary characteristics. …”
Article -
10
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…Although activation functions are important for MLP to learn but for nonlinear complex functional mappings it has complicated calculation which reduces the accuracy of classification. …”
Get full text
Get full text
Thesis -
11
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Passwords are frequently used to control access to restricted functions. …”
Get full text
Get full text
Thesis -
12
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
Get full text
Get full text
Thesis -
13
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…Popular hash functions are Message Digest 4/5 (MD-4/5), Secure Hashing Algorithm (SHA-0/1) and RIPEMD, which are referred to as MDx-class hash functions due to some commonalities in their design with the MD-family. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
Get full text
Get full text
Get full text
Article -
17
Symmetric Key Size for Different Level of Information Classification
Published 2006“…Therefore confidential information is normally protected by using cryptographic algorithms. In these algorithms, key is an important element since it is one of the parameters that determine the level of security that the algorithms can provide. …”
Get full text
Get full text
Conference or Workshop Item -
18
On line fault detection for transmission line using power system stabilizer signals
Published 2007“…Hence, this study will show that not only the PSS able to compensate the damping due to the disturbance but also by using the developed algorithm it succeeds to detect and classify the fault conditions on the parallel transmission lines.…”
Get full text
Get full text
Thesis -
19
Spear- phishing attack detection using artificial intelligence
Published 2024“…The goal is to mitigate phishing and spam threats by using advanced algorithms to detect malicious URLs and classify messages effectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
