Search Results - (( its applications security algorithm ) OR ( based application learning algorithm ))*
Search alternatives:
- application learning »
- learning algorithm »
- based application »
- its applications »
-
1
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
2
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
3
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
4
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
5
Deep Learning Based Face Attributes Recognition
Published 2018“…Combined-algorithm based optimizers plays an important role in optimizing the training algorithm. …”
Get full text
Get full text
Monograph -
6
Glass break detection system using deep auto encoders with fuzzy rules induction algorithm
Published 2019“…Main uses of glass windows in commercial and residential buildings are prevalent. While a glass-based material has its advantages, it also poses security risks. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
Get full text
Get full text
Thesis -
8
A Study On AI-Driven Solutions for Cloud Security Platform
Published 2024“…Cognitive tasks comprise integration, computational cost, and the ethical effect of the algorithm are identified and discussed. Real-world applications and possibilities for further development, such as federated learning and XAI, are also described in order to give recommendations for the effective application of AI-based cloud security. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Nowadays more researchers use three type of approaches namely, Rule-base NER, Machine Learning-base NER and Hybrid NER to identify names. …”
Get full text
Get full text
Article -
10
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023“…Fog computing is a popular choice for Internet of Things (IoT) applications, such as electricity, health, transportation, smart cities, security, and more. …”
Get full text
Get full text
Article -
11
-
12
-
13
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026thesis::doctoral thesis -
14
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Here, the novelty of the work is the application of MVO algorithm in fine-turning the hyperparameters involved in BiGRU model. …”
Get full text
Get full text
Get full text
Article -
15
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
-
18
-
19
Network intrusion detection and alert system
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
