Search Results - (( based optimization method algorithm ) OR ( botnet detection learning algorithm ))
Search alternatives:
- detection learning »
- learning algorithm »
- method algorithm »
-
1
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
2
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. …”
Get full text
Get full text
Article -
3
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
4
-
5
-
6
A Static Approach towards Mobile Botnet Detection
Published 2016“…In this study we propose a static approach towards mobile botnet detection. This technique combines MD5, permissions, broadcast receivers as well as background services and uses machine learning algorithm to detect those applications that have capabilities for mobile botnets. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A smart framework for mobile botnet detection using static analysis
Published 2020“…This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. …”
Get full text
Get full text
Get full text
Article -
8
An enhanced android botnet detection approach using feature refinement
Published 2019“…In order to detect botnet attacks which causes immense chaos and problems to smartphones, first the Android botnet need to be analysed. …”
Get full text
Get full text
Thesis -
9
-
10
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
11
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
12
Secure IIoT-enabled industry 4.0
Published 2021“…IIoT-enabled botnets are highly scalable, technologically diverse, and highly resilient to classical and conventional detection mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning
Published 2024“…Machine learning algorithms have been proposed to identify bot networks with a focus on extracting features from high-dimensional datasets. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Android mobile malware detection model based on permission features using machine learning approach
Published 2022“…Both samples of datasets then were evaluated using machine learning and deep learning approaches to analyse the best accuracy of malware detection. …”
Get full text
Get full text
Thesis -
15
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
16
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…Therefore, the SMA method is redesigned for optimal location and sizing based on the total active power loss of the systems. …”
Get full text
Get full text
Thesis -
17
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
18
Opposition-based Whale Optimization Algorithm
Published 2018“…The OWOA use the Opposition-based method to enhance Whale Optimization Algorithm (WOA) performance. …”
Get full text
Get full text
Get full text
Article -
19
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
Get full text
Get full text
Article -
20
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…GA is a widely used optimization algorithm based on the concept of survival of the fittest. …”
Get full text
Get full text
Thesis
