Search Results - (( attack detection computer algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
-
1
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
3
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024Subjects:journal::journal article -
4
-
5
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…This research aims to provide a hybrid intrusion detection model for Cloud computing environment. For this purpose, a modified DCA is proposed in this research as the main detection algorithm in the new hybrid intrusion detection mechanism which works on Cloud Co-Residency Threat Detection (CCTD) that combines anomaly and misuse detection mechanism. …”
Proceedings Paper -
6
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
7
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
8
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Hence, the detection of network attacks on computer systems has remain a relevant field of research for some time. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…As a result of implementing this system: misused detection module uses the signature of attacks to detection the known attacks; anomaly detection module can detect the unknown attacks; signature generation module extracts the signature of attacks that are detected by Anomaly Detection System module, and maps the signatures into snort rules.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…This research aims to provide a hybrid intrusion detection model for Cloud computing environment. For this purpose, a modified DCA is proposed in this research as the main detection algorithm in the new hybrid intrusion detection mechanism which works on Cloud CoResidency Threat Detection (CCTD) that combines anomaly and misuse detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In future, the HW-DBN algorithm can be proposed as an integrated deep Learning for the classification performance of attack detection models.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017“…Nowadays, attack detection strategies have become the most vital component in computer security despite the main preventive measure in detecting the attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The detection of network attacks on computer systems remains an attractive but challenging research scope. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
An intelligence technique for denial of service (DoS) attack detection
Published 2018“…Nowadays, attack detection strategies have become the most vital component in computer security despite the main preventive measure in detecting the attacks. …”
Get full text
Get full text
Get full text
Article -
19
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019Get full text
Get full text
Get full text
Book Chapter -
20
SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan
Published 2018“…The software will be trained by using NSL KDD Cup dataset in order to make it learns about the Neptune attack and as a result, it will be able to detect and prevent such attack. …”
Get full text
Get full text
Student Project
