Search Results - (( using tls based algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…This thesis proposes a TLS-based malware detection (TLSMalDetect) approach based on ML classification to address flow feature utilization limitations in related work. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Position estimation comparison of a 3-D linear lateration algorithm with a reference selection technique by Yaro, A.S., Sha�Ameri, A.Z., Kamel, N.

    Published 2018
    “…The two five-GRS linear lateration algorithms chosen for comparison are based on single reference total least square (SF-TLS) and multiple reference least square (MF-LS) approaches. …”
    Get full text
    Get full text
    Article
  5. 5

    Improvement of vertical height accuracy using data fusion technique for terrain mapping in oil palm plantation by Muhadi, Nur 'atirah

    Published 2018
    “…The result indicates that filtering algorithm in TerraScan was good enough to be used for TLS data in oil palm plantation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…The proposed method involves utilising DNA-based components consisting of the nucleotides {A, T, G, C} to generate a novel Dynamic DNA-based S-Box. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13