Search Results - (( worm detection method algorithm ) OR ( java application graph algorithm ))
Search alternatives:
- application graph »
- method algorithm »
- java application »
- graph algorithm »
- worm »
-
1
A traffic signature-based algorithm for detecting scanning internet worms
Published 2009“…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
Get full text
Get full text
Get full text
Article -
2
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
3
-
4
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
Get full text
Get full text
Get full text
Article -
5
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
6
Ensemble based categorization and adaptive model for malware detection
Published 2011“…Current malware detection method involved string search algorithm which based on the pattern detection. …”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
10
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…The hyperparameter optimization achieved best performance by implementing the EHS algorithm at the system level, thereby increasing feature-detection accuracy and bridging the gap between deep learning innovation and real-world malware detection and response models. …”
thesis::doctoral thesis -
11
-
12
-
13
Inchworm robot grippers in clothes manipulation - Optimizing the tracing algorithm
Published 2023Conference paper -
14
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
Published 2024“…Its main categories include viruses, worms, Trojan horses, spyware, adware, and ransomware. …”
Get full text
Get full text
Get full text
Article
