Search Results - (( work detection a algorithm ) OR ( botnet detection based algorithm ))
Search alternatives:
- detection based »
- work detection »
- detection a »
- a algorithm »
-
1
A comprehensive review of mobile botnet detection using genetic algorithm: A systematic review
Published 2024journal::journal article -
2
Systematic analysis on mobile botnet detection techniques using genetic algorithm
Published 2024Conference Paper -
3
Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm
Published 2024“…Furthermore, this paper also discusses the challenges and the potential research for future work with relate of the genetic algorithm. This research paper can be used as a reference and guidance for further study on mobile botnet detection techniques.…”
Proceedings Paper -
4
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
5
Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis
Published 2012“…LBDF is equipped with a ‘malicious-scanning’ detection algorithm. The LBDF algorithm uses SYN, ACK (SNAK) rules to reduce the volume of network captured traffic and to convert the reduced traffic into discrete time sequences. …”
Get full text
Get full text
Thesis -
6
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…This new classification can be used as the input for mobile botnet detection for future work, especially for financial matters.…”
Proceedings Paper -
7
-
8
ABC: android botnet classification using feature selection and classification algorithms
Published 2017“…Due to the fast modifications in the technologies used by malicious application (app) developers, there is an urgent need for more advanced techniques for Android botnet detection. In this paper, a new approach for Android botnet classification based on features selection and classification algorithms is proposed. …”
Get full text
Get full text
Article -
9
-
10
An enhanced android botnet detection approach using feature refinement
Published 2019“…In order to detect botnet attacks which causes immense chaos and problems to smartphones, first the Android botnet need to be analysed. …”
Get full text
Get full text
Thesis -
11
ABC: Android botnet classification using feature selection and classification algorithms
Published 2024journal::journal article -
12
-
13
IoT-based botnet attacks systematic mapping study of literature
Published 2024journal::journal article -
14
Intersection Features For Android Botnet Classification
Published 2019“…This paper proposed an enhancement approach for Android botnet classification based on features selection and classification algorithms. …”
Get full text
Get full text
Get full text
Article -
15
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
16
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
17
Android mobile malware detection model based on permission features using machine learning approach
Published 2022“…Different techniques have been adopted to detect and prevent the spread of Android malware, including anomaly, signature-based, and hybrid detection techniques. …”
Get full text
Get full text
Thesis -
18
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Hence, a detailed flowchart of the working procedures of the project based on Canny edge detection algorithm is designed. …”
Get full text
Get full text
Final Year Project -
19
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…This paper seeks to conduct a thorough systematic literature review (SLR) and offer a taxonomy of machine learning methods for malware detection that considers these problems by analyzing 77 chosen research works related to malware detection using machine learning algorithm. …”
Article -
20
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis
