Search Results - (( _ application security algorithm ) OR ( its application learning algorithm ))*
Search alternatives:
- application learning »
- learning algorithm »
-
1
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
2
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
3
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
4
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
5
Deep Learning Based Face Attributes Recognition
Published 2018“…The automated face identification application is helpful in assisting forensic to survey an area with the implementation of Machine Learning (ML). …”
Get full text
Get full text
Monograph -
6
Glass break detection system using deep auto encoders with fuzzy rules induction algorithm
Published 2019“…While a glass-based material has its advantages, it also poses security risks. Therefore, glass break detectors play an important role in security protection for offices and residential buildings. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
A Study On AI-Driven Solutions for Cloud Security Platform
Published 2024“…Cognitive tasks comprise integration, computational cost, and the ethical effect of the algorithm are identified and discussed. Real-world applications and possibilities for further development, such as federated learning and XAI, are also described in order to give recommendations for the effective application of AI-based cloud security. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. The study evaluates and compares the efficacy of multiple machine learning algorithms, including the Autoencoder classifier, Extreme Gradient Boost (XGBoost), and Random Forest classifier, using metrics such as accuracy, precision, recall, and F1-score. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023“…Fog computing is a popular choice for Internet of Things (IoT) applications, such as electricity, health, transportation, smart cities, security, and more. …”
Get full text
Get full text
Article -
10
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
Get full text
Get full text
Thesis -
11
-
12
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
Get full text
Get full text
Article -
13
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026thesis::doctoral thesis -
14
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Algorithms".
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
15
-
16
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Here, the novelty of the work is the application of MVO algorithm in fine-turning the hyperparameters involved in BiGRU model. …”
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…As the adoption of solar PV systems continues to surge, the need for robust fault diagnosis and classification techniques becomes paramount to ensure optimal performance, maintenance and scalability across diverse scales of PV arrays in real-world applications. This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
Get full text
Get full text
Get full text
Article -
20
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article
