Search Results - detection based algorithm*

Search alternatives:

Refine Results
  1. 1

    CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets by Alaidaros, Hashem Mohammed

    Published 2017
    “…This study proposed a Conditional Hybrid Intrusion Detection (CHID) by combining the flow-based with packet-based detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Review on intrusion detection system based on the goal of the detection system by Khaleel, Mohammad Khamees, Ismail, Mohd Arfian, Yunan, Umar, Kasim, Shahreen

    Published 2018
    “…Previous studies review the IDS based on the approaches (algorithms) used or based on the types of the intrusion itself. …”
    Get full text
    Get full text
    Article
  4. 4

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…This paper compares different supervised algorithms for the anomaly-based detection technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Face detection system based on feature-based chrominance colour information by Chan, Y. H., Syed Abu Bakar, Syed Abdul Rahman

    Published 2004
    “…The face detection algorithm is based on the adapted chain code (ACC), eye detection and modified golden ratio (MGR). …”
    Get full text
    Get full text
    Get full text
    Book Section
  6. 6

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Vision-based flame detection: Motion detection amp; fire analysis by Mohd Razmi, S., Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…It is very crucial to develop a reliable method to detect an occurrence of fire. In this paper, vision-based flame detection using motion detection algorithm is discussed. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Flow-based approach on bro intrusion detection by Alaidaros, Hashem, Mahmuddin, Massudi

    Published 2017
    “…Based on our experiments, the findings showed that flow-based detection was able to identify the presence of all malicious activities. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…This thesis proposes a TLS-based malware detection (TLSMalDetect) approach based on ML classification to address flow feature utilization limitations in related work. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Review on Intrusion Detection System Based on The Goal of The Detection System by Khaleel, M. K., Mohd Arfian, Ismail, Yunan, Umar, Shahreen, Kasim

    Published 2018
    “…Previous studies review the IDS based on the approaches (algorithms) used or based on the types of the intrusion itself. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A Review on feature selection and ensemble techniques for intrusion detection system by Torabi, Majid, Udzir, Nur Izura, Abdullah @ Selimun, Mohd Taufik, Yaakob, Razali

    Published 2021
    “…We then analyze and discuss a variety of IDS-based machine learning techniques with various detection models (single classifier-based or ensemble-based), to illustrate their significance and success in the intrusion detection area. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…In recent years, detection methods based on machine learning techniques are widely deployed in order to improve the efficiency of anomaly-based detection. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Intrusion-Detection System Based on Fast Learning Network in Cloud Computing by Mohammed Hasan, Ali, Mohamad Fadli, Zolkipli

    Published 2018
    “…This paper includes an overview of the intrusion-detection system and introduces to the reader some fundamental concepts of IDS work in cloud computing, also propose a new algorithm Fast Learning Network to work based on an intrusion detection.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Face detection of thermal images based on color image processing by Nur Farahana , Mat Khairi

    Published 2012
    “…This thesis examines and implements the methods for face detection of thermal images based on color image processing. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Driver’s fatigue detection system based on facial features by Khan, Ijaz

    Published 2014
    “…Vision based approach is adopted to detect fatigue because other developed approaches are either intrusive (physical approach) that makes the driver uncomfortable or less sensitive (vehicle based approach). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Performance evaluation on quantized weight for convolutional neural network based object detection by Putra, Mohd Hasbullah

    Published 2021
    “…In this research, a real-time CNN based object detection system is presented. The system is designed based on the modified You Only Look Once (modified-YOLO) architecture which is constructed with only 7 CNN layers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis