Search Results - solution ((((computing techniques) OR (mining techniques))) OR (detection techniques))

Search alternatives:

Refine Results
  1. 1

    Medical diagnosis using data mining techniques / Shaiful Nizam Zamri by Shaiful Nizam , Zamri

    Published 2003
    “…Medical Diagnosis Using Data Mining Techniques is a system in specifically facilitates the data mining techniques in predicting the appropriate drug prescription of certain condition of patients. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Intrusion detection system with data mining approach: a review by Khalilian, Majdid, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…Despite of growing information technology widely, security has remained one challenging area for computers and networks. Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Review of firewall optimization techniques by Shakirah, Saidin, Mohamad Fadli, Zolkipli

    Published 2018
    “…This paper review firewall optimization techniques such as data mining, anomaly detection, and traffic awareness, that have been done throughout time. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Anti-cryptojacking system by Goh, Asher Ashley Ghin Shi

    Published 2025
    “…Research for this project involved reviewing current detection tools, studying different prevention techniques, and applying them into a practical extension design. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Article
  7. 7

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Source code analysis extractive approach to generate textual summary by Dawood, Kareem Abbas

    Published 2017
    “…Hence, many studies in this field are concentrating on text mining techniques to take out the data by source code analysis and generate a code summary. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Lungs cancer nodules detection from CT scan images with convolutional neural networks by Muhammad Zubair, Rehman, Nazri, Mohd Nawi, Tanveer, Aisha, Zafar, Hassan, Munir, Hamza, Hassan, Sher

    Published 2020
    “…Lungs cancer is a life-taking disease and is causing a problem around the world for a long time. The only plausible solution for this type of disease is the early detection of the disease because at preliminary stages it can be treated or cured. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Applied data mining approach in ubiquitous world of air transportation by Reza, S.M., Wah, T.Y., Lahsasna, A.

    Published 2011
    “…This paper is going to use one of successfully used data mining techniques, namely neural network, which is capable of recognizing patterns. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network by Ahmed, Abdulghani Ali

    Published 2019
    “…The proposed technique aims to detect Botnet zero-day attack in real time. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Lungs cancer nodules detection from ct scan images with convolutional neural networks by Zubair Rehman, Muhammad, Mohd Nawi, Nazri, Tanveer, Aisha, Zafar, Hassan, Munir, Hamza, Hassan, Sher

    “…Lungs cancer is a life-taking disease and is causing a problem around the world for a long time. The only plausible solution for this type of disease is the early detection of the disease because at preliminary stages it can be treated or cured. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Accelerated mine blast algorithm for ANFIS training for solving classification problems by Mohd Salleh, Mohd Najib, Hussain, Kashif

    Published 2016
    “…Mine Blast Algorithm (MBA) is newly developed metaheuristic technique. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Stepping-stone detection technique for recognizing legitimate and attack connections by Daud, Ali Yusny, Ghazali, Osman, Omar, Mohd Nizam

    Published 2015
    “…However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Uncovering Hidden Information Within R&D Department's Ticket Using Data Mining Clustering Approach by Azmi, Abu Bakar

    Published 2011
    “…In this study the data extracted is clustered using two different types of data mining techniques i.e. K-Means and Kohonen Network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique by Ali Mohamed, Nachaat Abdelatif

    Published 2022
    “…The current security solutions are deployed to detect APT signature and behaviour after APT bypasses the entire protections and accomplishes lateral movement technique, which makes the current solutions ineffective to resolve APT problem.…”
    Get full text
    Get full text
    Thesis
  19. 19

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An elapsed-time based scheme for detecting and mitigating DDOS attacks in the SDN environment by Wisam H A.Muragaa

    Published 2024
    “…DDoS detection solutions based on Machine learning techniques and entropy techniques in SDN suffer from either increase the CPU usage or increase false alarms. …”
    thesis::doctoral thesis