Search Results - (( botnet detection based algorithm ) OR ( based optimization method algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm by Rahman, MZA, Madihah Mohd Saudi

    Published 2024
    “…A case study was carried out to reverse engineering the mobile botnet codes. Based on the findings, this mobile botnet has successfully posed itself as a fake anti-virus and has the capability to steal important data such as username and password from the Android-based devices. …”
    Proceedings Paper
  5. 5

    ABC: android botnet classification using feature selection and classification algorithms by Abdullah, Zubaile, Mohd Saudi, Madihah, Anuar, Nor Badrul

    Published 2017
    “…Due to the fast modifications in the technologies used by malicious application (app) developers, there is an urgent need for more advanced techniques for Android botnet detection. In this paper, a new approach for Android botnet classification based on features selection and classification algorithms is proposed. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…This new classification can be used as the input for mobile botnet detection for future work, especially for financial matters.…”
    Proceedings Paper
  8. 8
  9. 9
  10. 10

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…In order to detect botnet attacks which causes immense chaos and problems to smartphones, first the Android botnet need to be analysed. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…This paper proposed an enhancement approach for Android botnet classification based on features selection and classification algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization by Saudi, MM, Abuzaid, AM, Taib, BM, Abdullah, ZH

    Published 2024
    “…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
    Proceedings Paper
  16. 16
  17. 17

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…Therefore, the SMA method is redesigned for optimal location and sizing based on the total active power loss of the systems. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Android mobile malware detection model based on permission features using machine learning approach by Sharfah Ratibah, Tuan Mat

    Published 2022
    “…Different techniques have been adopted to detect and prevent the spread of Android malware, including anomaly, signature-based, and hybrid detection techniques. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis