Search Results - (( using optimization method algorithm ) OR ( security classification learning algorithm ))
Search alternatives:
- security classification »
- classification learning »
- learning algorithm »
- method algorithm »
-
1
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…The algorithm is improved with Particle Swarm Optimization that trains three different supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
2
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
Get full text
Get full text
Get full text
Article -
3
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…DL models often use gradient descent optimization, i.e., the Back-Propagation (BP) algorithm; therefore, their training and optimization procedures suffer from local sub-optimal solutions. …”
Get full text
Get full text
Get full text
Article -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
5
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…However, the training datasets usually compose feature sets of irrelevant or redundant information, which impacts the performance of classification, and traditional learning algorithms such as backpropagation suffer from known issues, including slow convergence and the trap of local minimum. …”
Get full text
Get full text
Thesis -
6
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…An efficient IDS uses computational methods as techniques of machine learning (ML) to enhance the rates of detection to obtain the lowest false positive rate, although such rates tend to be reduced by the big amount of irrelevant features as an optimization issue. …”
Get full text
Get full text
Thesis -
7
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
8
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…A maximum accuracy of 81% is obtained for Decision Tree algorithm during the prediction of crime. The findings demonstrate that employing Machine Learning techniques aids in the prediction of criminal events, which has aided in the enhancement of public security.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
Get full text
Get full text
Thesis -
11
Aerial imagery paddy seedlings inspection using deep learning
Published 2022“…The emergence of artificial intelligence due to the capability of recent advances in computing architectures could become a new alternative to existing solutions. Deep learning algorithms in computer vision for image classification and object detection can facilitate the agriculture industry, especially in paddy cultivation, to alleviate human efforts in laborious, burdensome, and repetitive tasks. …”
Get full text
Get full text
Article -
12
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…The best phishing classification features and machine learning technique are identified in order to produce and generate a classification model. …”
Get full text
Get full text
Thesis -
13
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024Subjects:Article -
14
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…The IDS with machine learning method improves the detection accuracy of the security attacks. …”
Get full text
Get full text
Get full text
Article -
15
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
16
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
17
-
18
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024Proceedings Paper -
19
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…This study was solely concerned with the Windows malware dataset. The malware classification was determined by testing and training the supervised ML algorithms using the extracted features from the malware dataset. …”
Get full text
Get full text
Get full text
Article -
20
A novel framework for identifying twitter spam data using machine learning algorithms
Published 2020“…The research results contribute significantly to the field of cyber-security by forming a real-time system using machine learning algorithms.…”
Get full text
Get full text
Get full text
Article
