98 results on '"MAAROF, MOHD AIZAINI"'
Search Results
2. Fraudulent e-Commerce Website Detection Model Using HTML, Text and Image Features
3. A Taxonomy and Survey of Data Partitioning Algorithms for Big Data Distributed Systems
4. Enhanced Text Stemmer with Noisy Text Normalization for Malay Texts
5. Design Consideration of Malay Text Stemmer Using Structured Approach
6. Hybrid Solution for Privacy-Preserving Data Mining on the Cloud Computing
7. Towards Stemming Error Reduction for Malay Texts
8. Content Based Fraudulent Website Detection Using Supervised Machine Learning Techniques
9. A 0-Day Aware Crypto-Ransomware Early Behavioral Detection Framework
10. Enhanced Rules Application Order to Stem Affixation, Reduplication and Compounding Words in Malay Texts
11. Malay Word Stemmer to Stem Standard and Slang Word Patterns on Social Media
12. Design Consideration for Improved Term Weighting Scheme for Pornographic Web sites
13. Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory
14. Islamic Web Content Filtering and Categorization on Deviant Teaching
15. Enhanced Rules Application Order Approach to Stem Reduplication Words in Malay Texts
16. Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection
17. A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory
18. A proposed Adaptive Pre-Encryption Crypto-Ransomware Early Detection Model
19. Advanced Persistent Threat Detection: A Survey
20. HAC: Model for Privacy-Preserving Outsourced Data Over Cloud
21. Design of Adaptive IDS with Regulated Retraining Approach
22. Malware Detection Techniques Using Artificial Immune System
23. Multi-classifier Scheme with Low-Level Visual Feature for Adult Image Classification
24. The Concept of Bio-fitness in Bio-inspired Computational Metaphor Abstraction
25. A multi-color based features from facial images for automatic ethnicity identification model
26. Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme for Vehicular Ad Hoc Network: A Context-Aware Approach
27. Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection
28. An Improved Discrete Cosine Transformation Block Based Scheme for Copy-move Image Forgery Detection
29. Polymorphism and Danger Susceptibility of System Call DASTONs
30. Using Text Annotation Tool on Cyber Security News — A Review
31. Ransomware Entities Classification with Supervised Learning for Informal Text
32. TAGraph: Knowledge Graph of Threat Actor
33. Solving Time Complexity Issue in Copy-Move Forgery Detection Thru Pre-processing Techniques
34. Cyber-Attack Features for Detecting Cyber Threat Incidents from Online News
35. A Conceptual Scheme for Ransomware Background Knowledge Construction
36. Multi-Scale Skin Sample Approach for Dynamic Skin Color Detection: An Analysis
37. An Improved DCT Block Based Technique for Copy-Move Forgery Detection in Medical Images
38. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
39. Implementation and recent progress in cloud-based smart home automation systems
40. A distributed anomaly detection model for wireless sensor networks based on the one-class principal component classifier
41. An optimized skin texture model using gray-level co-occurrence matrix
42. A Hybrid Color Space for Skin Recognition for Real-Time Applications
43. Word Stemming Methods for the Malay Language: A Review
44. GAZELLE: An Enhanced Random Network Coding Based Framework for Efficient P2P Live Video Streaming Over Hybrid WMNs
45. A Robust Keypoint Descriptor Based on Tomographic Image Reconstruction Using Heuristic Genetic Algorithm and Principal Component Analysis Techniques
46. Fraud detection system: A survey
47. Word stemming challenges in Malay texts: A literature review
48. Improved Dynamic Threshold Method for Skin Colour Detection Using Multi-Colour Space
49. A Hybrid Color Space for Skin Detection Using Genetic Algorithm Heuristic Search and Principal Component Analysis Technique
50. Defining Generic Attributes for IDS Classification
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.