A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Cryptocurrency, often known as electronic money, is a currency that exists in digital form. As a result, numerous attackers or hackers are taking advantage of this chance to employ cryptojacking to gain access to a victim's computer or other device resources and mine cryptocurrency without the...
| Main Author: | Kong, Jun Hao |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/40591/ http://umpir.ump.edu.my/id/eprint/40591/1/CB19109.pdf |
Similar Items
A Botnet Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
by: Ong, Wei Cheng
Published: (2023)
by: Ong, Wei Cheng
Published: (2023)
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2022)
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2022)
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024)
by: Kadhum, Laith M., et al.
Published: (2024)
Object detection using geometric invariant moment
by: Saad, Puteh, et al.
Published: (2006)
by: Saad, Puteh, et al.
Published: (2006)
Differences between pearson’s product moment correlation coefficient and an absolute value correlation coefficient in the presence of outliers / Norafefah Mohamad Sobri ...[et al]
by: Mohamad Sobri, Norafefah, et al.
Published: (2016)
by: Mohamad Sobri, Norafefah, et al.
Published: (2016)
Image analysis by Tchebichef moments
by: Mukundan, Ramakrishnan, et al.
Published: (2001)
by: Mukundan, Ramakrishnan, et al.
Published: (2001)
Translation invariants of Zernike moments
by: Chong, C
Published: (2003)
by: Chong, C
Published: (2003)
Translation and scale invariants of Legendre moments
by: Chong, C
Published: (2004)
by: Chong, C
Published: (2004)
The scale invariants of pseudo-Zernike moments
by: Chong, Chee Way, et al.
Published: (2003)
by: Chong, Chee Way, et al.
Published: (2003)
Embedded scale united moment invariant for identification of handwriting individuality
by: Muda, Azah Kamilah, et al.
Published: (2007)
by: Muda, Azah Kamilah, et al.
Published: (2007)
Improved hybrid intelligent intrusion detection system using AI technique
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
Intelligent entry and notification system for academic office
by: Lai, Shao Jun
Published: (2018)
by: Lai, Shao Jun
Published: (2018)
Scale invariants of three-dimensional Legendre moments
by: Ong, , Lee-Yeng, et al.
Published: (2006)
by: Ong, , Lee-Yeng, et al.
Published: (2006)
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
by: Shamshirband, Shahaboddin
Published: (2014)
by: Shamshirband, Shahaboddin
Published: (2014)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
An efficient algorithm for fast computation of pseudo-Zernike moments
by: Chong, Chee-Way
Published: (2003)
by: Chong, Chee-Way
Published: (2003)
Fault detection and diagnosis using correlation coefficients
by: Mak, Weng Yee
Published: (2005)
by: Mak, Weng Yee
Published: (2005)
A comparative analysis of algorithms for fast computation of Zernike moments
by: Chong, C
Published: (2003)
by: Chong, C
Published: (2003)
Passive video forgery detection using frame correlation statistical features / Aminu Mustapha Bagiwa
by: Aminu Mustapha, Bagiwa
Published: (2017)
by: Aminu Mustapha, Bagiwa
Published: (2017)
Human pose estimation via convolutional part heatmap regression
by: Bulat, Adrian, et al.
Published: (2016)
by: Bulat, Adrian, et al.
Published: (2016)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking
by: Ariatmanto, Dhani, et al.
Published: (2020)
by: Ariatmanto, Dhani, et al.
Published: (2020)
Local DTW coefficients and pitch feature for back-propagation NN digits recognition
by: Sudirman, R., et al.
Published: (2006)
by: Sudirman, R., et al.
Published: (2006)
Intelligent image search engine with AI-Based similarity detection for web application
by: Chong, Wai Soon
Published: (2024)
by: Chong, Wai Soon
Published: (2024)
Intelligent light control system (ILIC)
by: Badihah, Ismail
Published: (2016)
by: Badihah, Ismail
Published: (2016)
An Approach to 3-D Object Recognition Using Legendre Moment Invariants
by: Ong, Lee-Yeng, et al.
Published: (2007)
by: Ong, Lee-Yeng, et al.
Published: (2007)
Heatmap visualization approach for descriptive analytics of Covid-19 cases in Malaysia
by: Zolkepli, Maslina, et al.
Published: (2024)
by: Zolkepli, Maslina, et al.
Published: (2024)
The development of virtual product life cycle design tool using artificial intelligence technique
by: Harun, Habibollah, et al.
Published: (2008)
by: Harun, Habibollah, et al.
Published: (2008)
Correlation of Near-Infrared (Nir) Spectroscopy with Water Quality Sensors to Detect Concentration of Saccharomyces Boulardii in Water
by: Muhammad Aqil, Hafizzan Nordin, et al.
Published: (2023)
by: Muhammad Aqil, Hafizzan Nordin, et al.
Published: (2023)
Fuzzy petri nets as a classification method for automatic speech intelligibility detection of children with speech impairments / Fadhilah Rosdi
by: Fadhilah, Rosdi
Published: (2016)
by: Fadhilah, Rosdi
Published: (2016)
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
Intelligent public transport guide system for Kuala Lumpur
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
Intelligent assessment system robotic / Nurul Ain Hassim
by: Nurul Ain , Hassim
Published: (2005)
by: Nurul Ain , Hassim
Published: (2005)
Human identification system based on moment invariant features
by: Mohd Ibrahim, Azhar, et al.
Published: (2012)
by: Mohd Ibrahim, Azhar, et al.
Published: (2012)
Paraphrase Detection using String Similarity with Synonyms
by: Lee, Jun Choi, et al.
Published: (2015)
by: Lee, Jun Choi, et al.
Published: (2015)
Development of intelligent 3D solid modeler based on artificial intelligent technique
by: Mohd. Zain, Azlan, et al.
Published: (2008)
by: Mohd. Zain, Azlan, et al.
Published: (2008)
A Study on Central Moments of the Histograms from Scanning Electron Microscope Charging Images
by: Tan, Y. Y., et al.
Published: (2007)
by: Tan, Y. Y., et al.
Published: (2007)
Where is the intelligence in computational intelligence?
by: Pathan, Al-Sakib Khan
Published: (2005)
by: Pathan, Al-Sakib Khan
Published: (2005)
Visualizing pandemics with calendar heatmaps : a case study of COVID-19 in Malaysia
by: Zolkepli, Maslina, et al.
Published: (2024)
by: Zolkepli, Maslina, et al.
Published: (2024)
Similar Items
-
A Botnet Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
by: Ong, Wei Cheng
Published: (2023) -
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2022) -
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
by: Nur Khairani, Kamarudin, et al.
Published: (2023) -
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024) -
Object detection using geometric invariant moment
by: Saad, Puteh, et al.
Published: (2006)