Search Results - (( attack detection during algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- detection during »
- during algorithm »
- java simulation »
-
1
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
2
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…The results show that the proposed model was able to detect most of the types of attacks that conducted during the experiment. …”
Proceedings Paper -
3
-
4
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…The results show that the proposed model was able to detect most of the types of attacks that conducted during the experiment. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
6
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
7
SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan
Published 2018“…The software will be trained by using NSL KDD Cup dataset in order to make it learns about the Neptune attack and as a result, it will be able to detect and prevent such attack. …”
Get full text
Get full text
Student Project -
8
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
9
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
10
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
11
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
12
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…The results indicated that the three layered back propagation neural network with a 3-7-3 structure provides a detection rate of 99.55% for direct DoS attacks and 97.82% for amplification DoS attacks. …”
Get full text
Get full text
Thesis -
13
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
14
Enhancement of most significant bit (MSB) algorithm using discrete cosine transform (DCT) in non-blind watermarking / Halimah Tun Abdullah
Published 2014“…According to how watermark detected and extracted, this project use non-blind watermarking mean need an original image during extraction process. …”
Get full text
Get full text
Thesis -
15
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
16
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
17
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
Distributed Denial-of-Service Defense System
Published 2006“…The scope of study will coverthe aspect of howthe attack detection algorithms work and identify the attack traffic, hence develop appropriate attack responses. …”
Get full text
Get full text
Final Year Project -
20
MalDroid: Secure DL-enabled intelligent malware detection framework
Published 2021“…The authors present a secure by design efficient and intelligent Android detection framework against prevalent, sophisticated and persistent malware threats and attacks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
