Search Results - learning relational differences ((encryption algorithm) OR (evolutionary algorithm))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1
  2. 2

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Automating commercial video game development using computational intelligence by Tse, Guan Tan, Teo, Jason Tze Wi, Patricia Anthony

    Published 2011
    “…Our approach is to use a simple but powerful evolutionary algorithm called Evolution Strategies (ES) to evolve the connection weights and biases of feed-forward Artificial Neural Networks (ANN) and to examine its learning ability through computational experiments in a non-deterministic and dynamic environment, which is the well-known arcade game, called Ms. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah by Adewole Kayode, Sakariyah

    Published 2018
    “…The performance of ten (10) machine learning algorithms were evaluated to select the best classifier for both SADM and SMDM. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Design of intelligent control system and its application on fabricated conveyor belt grain dryer by Lutfy, Omar F.

    Published 2011
    “…This controller has several advantages over its conventional ANFIS counterpart, particularly the reduction in processing time. Moreover, three evolutionary algorithms (EAs), in particular a real-coded genetic algorithm (GA), a particle swarm optimization (PSO), and a global-best harmony search (GHS), were separately used to train the proposed controller and to determine its scaling factors. …”
    Get full text
    Get full text
    Thesis