DATA MINING: A ‘RIM’ ALGORITHM FOR SPYWARE DETECTION WITH PRUNING
Journal Title: Indian Journal of Computer Science and Engineering - Year 2014, Vol 5, Issue 2
Abstract
The aim of this paper is to employ the principles of data mining and classify a new algorithm. In this method, we have proposed a new anti-spyware system (Spyware Detection), which is capable for classifying spyware files from legitimate files. Also we have evaluated the performance of our anti-spyware system with the existing anti- spywares in terms of overall accuracy (ACC) and false positive rate (FPR)... This paper describes the use of classification trees and shows the methods of pruning them using the new Algorithm.The RIM algorithm which can be classified and compared with other algorithms like Naïve Bayes, HNB (Hidden Naïve Bayes) , Random Tree Algorithm The experimental results suggest that our method is better than the existing methods and shows the best result.
Authors and Affiliations
Mrs. Indulakshmi , Dr. Nalini
AUTOMATIC ALGORITHM SPECIFICATION TO SOURCE CODE RANSLATION
Computers have become all-pervasive, and are being used in a variety of areas like Microbiology, Astronomy, Social Sciences and many others. In almost all these areas, algorithmic solutions to problems are common. Howeve...
MODELLING PERFORMANCE MONITORING OF IT INFRASTRUCTURE COMPONENTS USING TIMED PETRI NETS
This paper focuses on utilization of Petri Nets as a modelling and simulation tool for analyzing performance monitoring of IT infrastructure. In order to make informed fine tuning decisions, modelling and simulation base...
ENGLISH ALPHABET RECOGNITION USING CHAIN CODE AND LCS
Since several decades OCR system is getting more and more useful in daily life for various purposes. Many researches have been done on many types of characters by using different approaches. However very little investiga...
TEST SUITE GENERATION PROCESS FOR AGENT TESTING
Software agents are a promising technology for today's complex, distributed systems. Methodologies and techniques that address testing and reliability of multi agent systems are increasingly demanded, in particular to su...
A REVIEW OF M-LEARNING MODELS
In the most recent times, mobile visitors form the fastest growing Web community. The ease with which web pages or information is retrieved from the Web using PDAs or cell phones is a result of the rapid development in w...