Search Results - (( work detection ((a algorithm) OR (_ algorithm)) ) OR ( botnet detection based algorithm ))
Search alternatives:
- detection based »
- work detection »
- a algorithm »
-
1
A comprehensive review of mobile botnet detection using genetic algorithm: A systematic review
Published 2024journal::journal article -
2
Systematic analysis on mobile botnet detection techniques using genetic algorithm
Published 2024Conference Paper -
3
Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm
Published 2024“…Furthermore, this paper also discusses the challenges and the potential research for future work with relate of the genetic algorithm. This research paper can be used as a reference and guidance for further study on mobile botnet detection techniques.…”
Proceedings Paper -
4
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
5
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…This new classification can be used as the input for mobile botnet detection for future work, especially for financial matters.…”
Proceedings Paper -
6
Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis
Published 2012“…LBDF is equipped with a ‘malicious-scanning’ detection algorithm. The LBDF algorithm uses SYN, ACK (SNAK) rules to reduce the volume of network captured traffic and to convert the reduced traffic into discrete time sequences. …”
Get full text
Get full text
Thesis -
7
-
8
ABC: android botnet classification using feature selection and classification algorithms
Published 2017“…Due to the fast modifications in the technologies used by malicious application (app) developers, there is an urgent need for more advanced techniques for Android botnet detection. In this paper, a new approach for Android botnet classification based on features selection and classification algorithms is proposed. …”
Get full text
Get full text
Article -
9
-
10
An enhanced android botnet detection approach using feature refinement
Published 2019“…In order to detect botnet attacks which causes immense chaos and problems to smartphones, first the Android botnet need to be analysed. …”
Get full text
Get full text
Thesis -
11
ABC: Android botnet classification using feature selection and classification algorithms
Published 2024journal::journal article -
12
-
13
IoT-based botnet attacks systematic mapping study of literature
Published 2024journal::journal article -
14
Intersection Features For Android Botnet Classification
Published 2019“…This paper proposed an enhancement approach for Android botnet classification based on features selection and classification algorithms. …”
Get full text
Get full text
Get full text
Article -
15
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Hence, a detailed flowchart of the working procedures of the project based on Canny edge detection algorithm is designed. …”
Get full text
Get full text
Final Year Project -
16
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…This paper seeks to conduct a thorough systematic literature review (SLR) and offer a taxonomy of machine learning methods for malware detection that considers these problems by analyzing 77 chosen research works related to malware detection using machine learning algorithm. …”
Article -
17
Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali
Published 2020“…The prototype’s functionality testing proves that the prototype works well, and the detection accuracy testing proves that the algorithm shows a good performance in producing the output of segmented image. …”
Get full text
Get full text
Thesis -
18
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
19
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
20
Real-time system for facial emotion detection using GPSO algorithm
Published 2012Get full text
Working Paper
