-
1
Efficient Algorithms for Constructing Preset Distinguishing Sequences for Nondeterministic Finite State Machines
منشور في 2016الموضوعات: احصل على النص الكامل
doctoralThesis -
2
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
منشور في 2022"…The performance of three machine learning (ML) algorithms was assessed to predict the wild blueberry harvest losses on the ground. …"
-
3
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …"
احصل على النص الكامل
احصل على النص الكامل
-
4
New aspect-oriented constructs for security hardening concerns
منشور في 2009"…They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
5
Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology
منشور في 2023"…In this study, the emergency control algorithms based on ensemble machine learning algorithms (XGBoost and Random Forest) were developed for a low-inertia power system. …"
احصل على النص الكامل
article -
6
-
7
New primitives to AOP weaving capabilities for security hardening concerns
منشور في 2007"…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
8
Common weaving approach in mainstream languages for software security hardening
منشور في 2013"…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. The security solutions are woven into GIMPLE representations in a systematic way, eliminating the need for manual hardening that might generate a considerable number of errors. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
9
-
10
Android Malware Detection Using Machine Learning
منشور في 2024"…In this work, several machine learning algorithms were utilized, namely k-Nearest neighbor (KNN), Decision Trees (DT), Naive Bayes (NB), Support Vector Machine (SVM) and other ensemble classifiers including Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LGBM) and CatBoost. …"
احصل على النص الكامل
article -
11
-
12
-
13
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
منشور في 2022"…The main objective of this paper is to apply GOA to estimate the optimal parameters of the Gaussian membership function in an IT2-FLS. The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …"
-
14
Ensemble Deep Random Vector Functional Link Neural Network for Regression
منشور في 2022"…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …"
-
15
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…An intrusion detection system (IDS) is the most promising solution for preventing malicious intrusions and tracing suspicious network behavioral patterns. Machine learning (ML) methods are widely used in IDS. …"
-
16
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm
منشور في 2021"…The Support Vector Machine (SVM) algorithm is used for classification and the average F-Score is used as fitness function and target condition. …"
-
17
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …"
-
18
Iterative Least Squares Functional Networks Classifier
منشور في 2007"…A comparative study with the most common classification algorithms in both machine learning and statistics communities is carried out. …"
احصل على النص الكامل
احصل على النص الكامل
article -
19
-
20
Machine Learning Model for a Sustainable Drilling Process
منشور في 2023احصل على النص الكامل
doctoralThesis