Search Results - (( using (vectorisation OR victimization) mining algorithm ) OR ( java application bee algorithm ))
Search alternatives:
- mining algorithm »
- java application »
- application bee »
- bee algorithm »
-
1
An Automated System For Classifying Conference Papers
Published 2021“…A randomised stratified 5- fold cross validation was then applied on several data mining algorithms and evaluated using the F-measure as a metric. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
Published 2023“…It can also be used to profile victim demographics based on victim characteristics. …”
Get full text
Get full text
Article -
3
An association rule mining approach in predicting flood areas
Published 2017“…The association rules mining technique will generate the best rules from the dataset by using Apriori algorithm which had been applied to find the frequent itemsets. …”
Get full text
Get full text
Conference or Workshop Item -
4
An Association Rule Mining Approach in Predicting Flood Areas
Published 2016“…The association rules mining technique will generate the best rules from the dataset by using Apriori algorithm which had been applied to find the frequent itemsets. …”
Get full text
Get full text
Get full text
Book Section -
5
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…This study analyzed the levels of minor, moderate, and severe traffic accidents in the Palembang Police area from 2015 to 2020 using association rule mining and the apriori algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…The Phishing Rule-Based algorithm is used to extract SMS Phishing. For Module 2, the SMS Attack Profiling algorithm is used in order to produce SMS Spam and Phishing words. …”
Get full text
Get full text
Get full text
Thesis -
7
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…As a result, numerous attackers or hackers are taking advantage of this chance to employ cryptojacking to gain access to a victim's computer or other device resources and mine cryptocurrency without the users' permission. …”
Get full text
Get full text
Undergraduates Project Papers -
8
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
Published 2022“…Cryptojacking is a subset of cybercrime in which hackers use unauthorised devices (computers, smartphones, tablets, and even servers) to mine cryptocurrencies. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
