Search Results - (( _ application learning algorithm ) OR ( based applications security algorithm ))*
Search alternatives:
- application learning »
- learning algorithm »
- based applications »
-
1
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…For each algorithm, prior works have been identified, examined, and described based on their conceptual similarities. …”
Get full text
Get full text
Get full text
Article -
2
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
3
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…Machine Learning (ML) is seen as a promising application that offers autonomous learning and provides optimized solutions to complex problems. …”
Article -
4
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…Several machine learning techniques based on supervised learning have been applied to classify malware. …”
Get full text
Get full text
Get full text
Article -
5
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
6
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
7
Deep Learning Based Face Attributes Recognition
Published 2018“…Combined-algorithm based optimizers plays an important role in optimizing the training algorithm. …”
Get full text
Get full text
Monograph -
8
Glass break detection system using deep auto encoders with fuzzy rules induction algorithm
Published 2019“…This leads to the inability to differentiate glass break from environmental sounds (such as the sound of striking objects, heavy sounds and shouted sounds) that are similar in their amplitude threshold and frequency pattern. Machine learning based acoustic audio classification has been popular in security surveillance applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
11
-
12
-
13
Automated intruder detection from image sequences using minimum volume sets
Published 2012“…We propose a new algorithm based on machine learning techniques for automatic intruder detection in visual surveillance networks. …”
Get full text
Get full text
Get full text
Article -
14
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
Get full text
Get full text
Thesis -
15
-
16
A hybrid intrusion detection system based on different machine learning algorithms
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Improving intrusion detection using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Article -
18
A Study On AI-Driven Solutions for Cloud Security Platform
Published 2024“…Cognitive tasks comprise integration, computational cost, and the ethical effect of the algorithm are identified and discussed. Real-world applications and possibilities for further development, such as federated learning and XAI, are also described in order to give recommendations for the effective application of AI-based cloud security. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026thesis::doctoral thesis -
20
