Search Results - (( worm detection method algorithm ) OR ( java application path algorithm ))
Search alternatives:
- method algorithm »
- java application »
- application path »
- path algorithm »
- worm »
-
1
A traffic signature-based algorithm for detecting scanning internet worms
Published 2009“…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
Get full text
Get full text
Get full text
Article -
2
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
3
-
4
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
Get full text
Get full text
Get full text
Article -
5
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
Get full text
Get full text
Thesis -
6
Ensemble based categorization and adaptive model for malware detection
Published 2011“…Current malware detection method involved string search algorithm which based on the pattern detection. …”
Get full text
Get full text
Get full text
Article -
7
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
-
10
Inchworm robot grippers in clothes manipulation - Optimizing the tracing algorithm
Published 2023Conference paper -
11
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
Published 2024“…Its main categories include viruses, worms, Trojan horses, spyware, adware, and ransomware. …”
Get full text
Get full text
Get full text
Article
